<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "http://jats.nlm.nih.gov/publishing/1.0/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">IR</journal-id>
<journal-title-group>
<journal-title>Information Research</journal-title>
</journal-title-group>
<issn pub-type="epub">1368-1613</issn>
<publisher>
<publisher-name>University of Bor&#x00E5;s</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">ir30340519</article-id>
<article-id pub-id-type="doi">10.47989/ir30340519</article-id>
<article-categories>
<subj-group xml:lang="en">
<subject>Research article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Computer knowledge in the field of personal archiving: an exploratory study based on grounded theory</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author"><name><surname>Huang</surname><given-names>Tiyang</given-names></name>
<xref ref-type="aff" rid="aff0001"/></contrib>
<contrib contrib-type="author"><name><surname>Pu</surname><given-names>Qingyun</given-names></name>
<xref ref-type="aff" rid="aff0002"/></contrib>
<contrib contrib-type="author"><name><surname>Zhang</surname><given-names>Li</given-names></name>
<xref ref-type="aff" rid="aff0003"/></contrib>
<aff id="aff0001"><bold>Tiyang Huang</bold> is currently an associate professor at the School of History and Archives, Yunnan University, China. He received his PhD in archival science from Yunnan University in 2016. His research interests include personal archiving, archival literacy, and the archiving of intangible cultural heritage; he has published articles on these topics in journals such as the Journal of Documentation and Library &#x0026; Information Science Research.</aff>
<aff id="aff0002"><bold>Qingyun Pu</bold> is currently a postgraduate of Library and Information Studies in the School of History and Archives at Yunnan University, China. Her research focuses on personal archiving and information literacy.</aff>
<aff id="aff0003"><bold>Li Zhang</bold> is currently a postgraduate of Library and Information Studies in the School of History and Archives at Yunnan University, China. His research focuses on personal digital archiving. He can be reached at <email xlink:href="954550892&#x0040;qq.com">954550892&#x0040;qq.com</email>.</aff>
</contrib-group>
<pub-date pub-type="epub"><day>25</day><month>10</month><year>2025</year></pub-date>
<pub-date pub-type="collection"><year>2025</year></pub-date>
<volume>30</volume>
<issue>3</issue>
<fpage>1</fpage>
<lpage>21</lpage>
<permissions>
<copyright-year>2025</copyright-year>
<copyright-holder>&#x00A9; 2025 The Author(s).</copyright-holder>
<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by-nc/4.0/">
<license-p>This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by-nc/4.0/">http://creativecommons.org/licenses/by-nc/4.0/</ext-link>), permitting all non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<abstract xml:lang="en">
<title>Abstract</title>
<p><bold>Introduction.</bold> Personal archiving has transformed from traditional general knowledge to literacy-oriented ability, which requires professional knowledge and skills in the digital age. The purpose of this paper is to propose a theoretical framework to illustrate the computer knowledge applied by computer practitioners and their mechanisms for applying computer knowledge in their personal archiving.</p>
<p><bold>Method.</bold> In-depth interviews were conducted with twenty-one computer practitioners in China.</p>
<p><bold>Analysis.</bold> The grounded-theory methodology was adopted for data analysis, and an integrated model of computer-knowledge composition and application mechanisms in the personal-archiving field was constructed.</p>
<p><bold>Results.</bold> Computer knowledge is reflected in the cognitive, archiving, sorting, storage and retrieval processes of personal archiving. It focuses mainly on archiving skills, document naming and sorting, archive security and storage, and archive retrieval. Computer practitioners have developed a knowledge-application mechanism that focuses on demand- and knowledge-driven actions in their personal-archiving behaviour. Moreover, the computer-knowledge composition in the personal-archiving field is very close to the knowledge requirements of computer literacy.</p>
<p><bold>Conclusions.</bold> Computer literacy should become an indispensable part of personal-archiving knowledge composition. Moreover, increasing the efficiency of personal archiving is a feasible method to enhance its motivation.</p>
</abstract>
</article-meta>
</front>
<body>
<sec id="sec1">
<title>Introduction</title>
<p>Personal archives are a set of documents in any format that are created, acquired, or received by an individual and provide evidence of an individual&#x2019;s activities (<xref ref-type="bibr" rid="R16">Dictionary Working Group of the Society of American Archivists, 2024</xref>). They not only include letters, memoirs, diaries, photo albums, articles, legal documents, certificates, and other printed or written records, but also include electronic documents, emails, blogs, digital photos, videos, audio tapes, websites, and other digital records. The storage, management, and access of these digital records relies on the specific information and communication devices that are used. Personal archives have indispensable historical, cultural, and evidential value for an individual, a family, and society. Their importance results from their ability to provide unique views of events; represent individuals and their richly individualistic activities; offer evidence of the underlying processes behind achievements and historical events; document the creative process; and bring the world of the past alive in evocative ways (<xref ref-type="bibr" rid="R23">John <italic>et al</italic>., 2010</xref>).</p>
<p>Since the 1980s, with the application of electronic products, such as personal computers, digital cameras, and smartphones, and the popularity of the Internet, it has become extremely convenient for individuals to generate and store digital archives (<xref ref-type="bibr" rid="R48">Zhao <italic>et al</italic>., 2019</xref>). Individuals can easily generate and accumulate information resources in quantities, formats and types of complexity comparable to past collections in libraries or archives (<xref ref-type="bibr" rid="R26">Lee, 2011</xref>). However, they face challenges of digital stewardship, distributed assets, value and accumulation, and retrieval from long-term storage (<xref ref-type="bibr" rid="R32">Marshall, 2008</xref>).</p>
<p>Personal archiving, which is the behaviour of creating, acquiring, receiving, organising, preserving, retrieving, and utilising personal archives that are related to individuals and have preservation values, is no longer a problem that can be effectively solved by simple storage; it also requires categorisation, storage, migration and backup to ensure that it can be stored securely and completely and used over time. It is clear that personal archiving has shifted from traditional common sense to literacy-based competencies that require specialised knowledge and skills. Scientists, teachers and the general public should acquire the necessary personal-archiving knowledge and skills to meet the challenges of the &#x2018;<italic>digital dark ages</italic>&#x2019; (<xref ref-type="bibr" rid="R25">Kuny, 1998</xref>).</p>
<p>It is the duty of the library and archival community to provide the general public with professional guidelines for personal archiving and enhance their personal-archiving literacy (<xref ref-type="bibr" rid="R15">Cushing, 2016</xref>; <xref ref-type="bibr" rid="R4">Becker and Nogues, 2012</xref>). Reasonable and effective personal-archiving guidelines, or literacy-enhancement programs, must be based on a scientific and rigorous personal-archiving knowledge system. However, academic work on the theoretical framework, or body of knowledge, on personal archiving is currently immature. <xref ref-type="bibr" rid="R20">Huang <italic>et al</italic>. (2021a)</xref> used in-depth interviews and grounded theory to construct the knowledge composition of archivists&#x0027; personal archiving and found that it had a kernel of archiving, categorisation, organisation, preservation and authentication.</p>
<p>However, related studies have also found that archivists&#x0027; personal-archiving practices face dilemmas, such as the archival ocean and digitisation anxiety, in the digital age, and that the essence of this lies in the lack of a professional-grade deep understanding of modern information and communication technology and the appropriate use of their derivatives (<xref ref-type="bibr" rid="R21">Huang <italic>et al</italic>., 2021b</xref>; <xref ref-type="bibr" rid="R22">Huang and Zhong, 2021</xref>). Moreover, research on personal archiving in the computer-science field focuses on the effective organisation and retrieval of massive personal archives (<xref ref-type="bibr" rid="R37">Trullemans and Signer, 2014</xref>; <xref ref-type="bibr" rid="R47">Zhao <italic>et al</italic>., 2014</xref>), information security of archives (<xref ref-type="bibr" rid="R12">Chen and Zhu, 2017</xref>) and the improvement of archiving efficiency (<xref ref-type="bibr" rid="R31">Liu <italic>et al</italic>. 2022</xref>). All these are real problems that must urgently be solved to address the above dilemmas.</p>
<p>The organisation, retrieval, security and backup of archive information are topics of common concern and cross-fertilisation between archival science and computer science (<xref ref-type="bibr" rid="R31">Liu, <italic>et al</italic>., 2022</xref>); therefore, relevant computer-science knowledge and skills should be an integral part of personal archiving. However, research has not yet answered the question of what knowledge and skills in the vast body of computer science are necessary and effective for personal archiving.</p>
<p>We believe that experts with a background in computer science and working in information and communication-related fields have a better understanding of the principles and technologies of computer systems, networks, programs, file systems, databases, and storage and information security. Moreover, they are good at applying their professional knowledge to solve the practical problems of personal archiving. In addition, the computer-science knowledge and skills they use in personal archiving are those that should be available. Therefore, one of the best ways to acquire a body of computer-science knowledge in the personal-archiving field is by generalising from the personal-archiving practices of computer-science practitioners.</p>
<p>Therefore, this study focused on the knowledge and skills needed to manage, maintain, and access personal digital archives in the field of computer science. We conducted in-depth interviews with twenty-one people who have a professional background in computer science, are engaged in information and communication-related work and have relatively rich experience in personal archiving. We adopted the grounded theory to explore the composition of computer-science knowledge and its method of applying personal archiving. We also attempted to generalise the knowledge and skills required for managing, maintaining, and accessing personal digital archives, considering the personal archiving practices of computer-science practitioners. We aim to contribute to the construction of a personal-archiving knowledge system, provide theoretical support for the release of personal-archiving guides to the general public by relevant organisations, and implement personal-archiving literacy education.</p>
</sec>
<sec id="sec2">
<title>Literature review</title>
<p>Since the beginning of the twenty-first century, personal archiving has attracted the attention of researchers in the fields of library and information science and computer science. Library and information science is devoted to researching the value orientation and behaviour of personal archiving (<xref ref-type="bibr" rid="R18">Guo, 2018</xref>), considering email (<xref ref-type="bibr" rid="R42">Whittaker <italic>et al.,</italic> 2006</xref>), smartphones (<xref ref-type="bibr" rid="R19">Hand, 2016</xref>), blogs and social media (<xref ref-type="bibr" rid="R51">Zhou <italic>et al</italic>., 2018</xref>) as important auxiliary tools for personal archiving. It explores how archival institutions, libraries, and archivists can intervene in and take responsibility for storing personal digital archives on their shelves (<xref ref-type="bibr" rid="R9">Burrows, 2006</xref>), and try to provide professional guidance on personal archiving for the general public (<xref ref-type="bibr" rid="R15">Cushing, 2016</xref>; <xref ref-type="bibr" rid="R4">Becker and Nogues, 2012</xref>).</p>
<p>Researchers in the computer-science field focus on how to use modern information technology to solve the problems of tools, labelling, retrieval and security in personal archiving, and mainly focus on three aspects.</p>
<p>Firstly, they develop personal-archiving tools. In the face of large and widely distributed personal digital records, the primary challenge is how to effectively manage them. Although the operating systems of ordinary computers and mobile devices can basically manage personal digital archives stored on the devices, it is difficult to implement systematic management, organisation, backup and retrieval. Therefore, researchers in the field of computer science are more concerned with developing personal-archiving tools, such as Gray Area (<xref ref-type="bibr" rid="R6">Bergman <italic>et al</italic>., 2019</xref>), Stuff I&#x0027;ve Seen (<xref ref-type="bibr" rid="R8">Boardman and Sasse, 2004</xref>) and the WebBox (<xref ref-type="bibr" rid="R38">Van Kleek <italic>et al</italic>., 2012</xref>). Some of these have received good market responses and assist in storing, organising, retrieving and accessing personal digital archives.</p>
<p>Secondly, they design and optimise the labelling and retrieval algorithms for personal archives. Personal archives have personalised characteristics, with various forms of public management and storage of personal digital archives; however, they all face the problems of effective management, convenient retrieval and access, <italic>etc</italic>. Therefore, labelling and retrieval have attracted considerable attention.</p>
<p>Researchers are committed to considering the impact of document importance on the storage and retrieval of personal archives (<xref ref-type="bibr" rid="R5">Bergman <italic>et al</italic>. 2009</xref>; <xref ref-type="bibr" rid="R28">Li, 2011</xref>). They use semantic technology to assist in the labelling of personal archives (<xref ref-type="bibr" rid="R41">Weippl <italic>et al</italic>., 2007</xref>; <xref ref-type="bibr" rid="R50">Zhou and Zhong, 2010</xref>); try to address the barriers to organising and managing personal information posed by diverse data sources (<xref ref-type="bibr" rid="R24">Jones <italic>et al</italic>., 2008</xref>; <xref ref-type="bibr" rid="R7">Berlin <italic>et al</italic>., 2017</xref>); reduce the trouble caused by different system architectures on the maintenance and access of personal data (<xref ref-type="bibr" rid="R38">Van Kleek <italic>et al</italic>., 2012</xref>; <xref ref-type="bibr" rid="R30">Liu and Zhu, 2013</xref>); and explore more optimal personal-archive retrieval methods (<xref ref-type="bibr" rid="R47">Zhao <italic>et al</italic>., 2014</xref>) and storage solutions (<xref ref-type="bibr" rid="R39">Wang <italic>et al</italic>., 2008</xref>). They hope to manage and share cross-platform personal files (<xref ref-type="bibr" rid="R37">Trullemans and Signer, 2014</xref>), collaborate and query personal cloud files (<xref ref-type="bibr" rid="R6">Bergman <italic>et al</italic>., 2019</xref>), and assist in the interaction between users and computers in mobile environments (<xref ref-type="bibr" rid="R10">Chen <italic>et al</italic>., 2010</xref>) to enhance the user&#x2019;s personal archiving experience.</p>
<p>Thirdly, they address the backup and security of personal archives. The digitisation of file and storage forms is one of the biggest differences between traditional and digital files, and the security and backup of files in the context of new technologies and equipment are causes for concern. Related research is committed to solving many technical problems of storage, arrangement and backup of personal digital archives.</p>
<p>Research has found that the proliferation of personal digital archives places new demands on data synchronisation and backup (<xref ref-type="bibr" rid="R36">Song <italic>et al</italic>., 2011</xref>), leading to the emergence of cloud-storage solutions (<xref ref-type="bibr" rid="R1">Ai <italic>et al</italic>., 2011</xref>). In addition, to solve the potential problems of data loss and information leakage, blockchain technology has been used to control access rights (<xref ref-type="bibr" rid="R49">Zheng <italic>et al</italic>., 2018</xref>; <xref ref-type="bibr" rid="R52">Zichichi <italic>et al</italic>., 2020</xref>), which ensure that the data are real, accurate and difficult to tamper with. Embedding encryption algorithms further protects the security level of personal privacy (<xref ref-type="bibr" rid="R27">Li, 2021</xref>; <xref ref-type="bibr" rid="R43">Xian, 2022</xref>), which ensures the efficiency and security of the users in managing and utilising their personal archives.</p>
<p>Overall, personal archiving in the digital age has become an academic issue that should be discussed specifically. Moreover, researchers in the fields of computer science and library and information science have explored the issues of achieving safe storage, effective management and convenient use of personal digital archives from the perspective of information technology. However, this is based on the public&#x2019;s perceptions, needs and behaviour in the management, storage and retrieval of personal digital archives, as well as the selection, evaluation and use of archiving tools, among other issues.</p>
<p>Archiving tools are only the foundation. More relevant knowledge and skills are required to support the public&#x2019;s better understanding, storage and use of personal digital archives and the various archiving tools available on the market. From this perspective, we should discover and understand what and how computer-science knowledge and skills are used by professional computer practitioners in personal digital archiving, and understand and systematise the computer-science knowledge required for personal archiving.</p>
<p>Together with the findings of our existing research on the composition of the archival body of knowledge, we can more accurately and appropriately construct a knowledge framework that can provide effective guidance for improving the public&#x2019;s personal-archiving literacy.</p>
</sec>
<sec id="sec3">
<title>Approach and Methodology</title>
<sec id="sec3_1">
<title>Grounded theory</title>
<p>As mentioned above, few research results are available on what computer-science knowledge and skills are useful for personal archiving and how people use them; it is difficult to use large-scale quantitative research methods to investigate this. To construct a theory system, it is more desirable to use qualitative research methods, such as in-depth interviews and participant observation, and to explore the experiences of experts who apply computer-science knowledge and skills to personal archiving.</p>
<p>The procedures of grounded theory involve taking data apart, conceptualising it, developing concepts in terms of their properties and dimensions, and then integrating the concepts relating to a core category (<xref ref-type="bibr" rid="R14">Corbin and Strauss, 2015. <italic>pp.98</italic></xref>). It emphasises collecting and analysing data during the research process (<xref ref-type="bibr" rid="R14">Corbin and Strauss, 2015. <italic>pp.29</italic></xref>) through open coding, axial coding and integration to identify concepts, integrate categories and develop the theories. This methodology is applicable to the goal of this study, which is to develop a knowledge system of personal archiving by mining the personal archiving experience of experienced computer practitioners, that is, to identify concepts, classify categories, and form a theoretical/knowledge system. Therefore, this study adopted an in-depth interview method to collect data and used the grounded theory approach to analyse the data and construct a body of knowledge.</p>
<p>The grounded theory coding and analysis of the textual material operates at three levels in this study. The process of open coding involves breaking data apart and delineating concepts to stand for interpreted meaning of raw data (<xref ref-type="bibr" rid="R14">Corbin and Strauss, 2015. <italic>pp.240</italic></xref>); it is exploratory and leads to concept identification and sorting into categories (<xref ref-type="bibr" rid="R14">Corbin and Strauss, 2015. <italic>pp.104</italic></xref>). The task of axial coding is to discover the underlying logical relationships between principal categories and subcategories and to verify those using raw data (<xref ref-type="bibr" rid="R13">Corbin and Strauss, 1990</xref>). Integration is linking categories relating to a core category and refining and trimming the theory (<xref ref-type="bibr" rid="R14">Corbin and Strauss, 2015. <italic>pp.290</italic></xref>).</p>
<p>In grounded theory, saturation refers to data sufficiency and the collection of data within the scope of manipulation until no new information emerges (<xref ref-type="bibr" rid="R34">Morse, 1995</xref>). It is usually explained in terms of &#x2018;<italic>when no new concepts are emerging</italic>&#x2019; (<xref ref-type="bibr" rid="R14">Corbin and Strauss, 2015. <italic>pp.146</italic></xref>). This generally means that no new concepts, categories, or relationships are discovered.</p>
</sec>
<sec id="sec3_2">
<title>Sampling</title>
<p>Computer-science practitioners represent a broad field, and there is some variation in how the profession is defined across countries. This study mainly relied on China&#x2019;s Catalogue of Undergraduate Majors in General Colleges and Universities (<xref ref-type="bibr" rid="R33">China Ministry of Education, 2020</xref>) to qualify it as necessary.</p>
<p>In this study, theoretical sampling was used to select individuals with at least one degree in computer science and related majors as specific interview subjects. When selecting majors, according to the aforementioned catalogue, the scope of computer science in this study was limited to electronic and information (0807), automation (0808), computer science (0809), information and computational science (070102) in mathematics (0701), and management science and engineering (1201).</p>
<p>Diverse educational schools, majors, occupations, genders and age groups were selected as far as possible, and convenience sampling was used to select respondents for grounded-theory coding after interviewing the twenty-one respondents. The basic information is shown in <xref ref-type="table" rid="T1">Table 1</xref>, with the interview period ranging from February 2022 to May 2023. The completed interviews were found to be saturated by the saturation test (see <bold>Data analysis</bold>, <italic><bold>Saturation test</bold></italic> for details).</p>
<table-wrap id="T1">
<label>Table 1.</label>
<caption><p>Summary of basic information of interviewed computer-science practitioners</p></caption>
<table>
<thead>
<tr>
<th align="left" valign="top"><bold>Number</bold></th>
<th align="center" valign="top"><bold>Sex</bold></th>
<th align="center" valign="top"><bold>Age</bold></th>
<th align="left" valign="top"><bold>Major (B.S., M.S. or Ph.D.)</bold></th>
<th align="left" valign="top"><bold>Occupation (content of work)</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td align="center" valign="top">001</td>
<td align="center" valign="top">Male</td>
<td align="center" valign="top">51</td>
<td align="left" valign="top">Library science/software engineering</td>
<td align="left" valign="top">Collegiate teacher</td>
</tr>
<tr>
<td align="center" valign="middle">002</td>
<td align="center" valign="middle">Female</td>
<td align="center" valign="middle">34</td>
<td align="left" valign="top">Computer science and technology/computer system architecture</td>
<td align="left" valign="top">Information technology librarian of university archives</td>
</tr>
<tr>
<td align="center" valign="middle">003</td>
<td align="center" valign="middle">Male</td>
<td align="center" valign="middle">42</td>
<td align="left" valign="top">Computer science and technology/educational technology/information and communication engineering</td>
<td align="left" valign="top">Information technology librarian of university archives</td>
</tr>
<tr>
<td align="center" valign="middle">004</td>
<td align="center" valign="middle">Male</td>
<td align="center" valign="middle">25</td>
<td align="left" valign="top">Information management and information system/computer science and technology</td>
<td align="left" valign="middle">Graduate</td>
</tr>
<tr>
<td align="center" valign="middle">005</td>
<td align="center" valign="middle">Male</td>
<td align="center" valign="middle">26</td>
<td align="left" valign="middle">Electronic information science and technology</td>
<td align="left" valign="top">Mobile Communications, Ltd. worker</td>
</tr>
<tr>
<td align="center" valign="middle">006</td>
<td align="center" valign="middle">Male</td>
<td align="center" valign="middle">26</td>
<td align="left" valign="top">Computer science and technology/computer science and technology</td>
<td align="left" valign="middle">Graduate</td>
</tr>
<tr>
<td align="center" valign="middle">007</td>
<td align="center" valign="middle">Female</td>
<td align="center" valign="middle">25</td>
<td align="left" valign="top">Computer science and technology/electronic information</td>
<td align="left" valign="middle">Graduate</td>
</tr>
<tr>
<td align="center" valign="top">008</td>
<td align="center" valign="top">Male</td>
<td align="center" valign="top">33</td>
<td align="left" valign="top">Software engineering</td>
<td align="left" valign="top">Internet practitioner</td>
</tr>
<tr>
<td align="center" valign="middle">009</td>
<td align="center" valign="middle">Female</td>
<td align="center" valign="middle">40</td>
<td align="left" valign="top">Electronic information science and technology/communication and information system</td>
<td align="left" valign="middle">University administrator</td>
</tr>
<tr>
<td align="center" valign="middle">010</td>
<td align="center" valign="middle">Female</td>
<td align="center" valign="middle">41</td>
<td align="left" valign="top">Computer science and technology/computer science and technology</td>
<td align="left" valign="top">Information technology librarian of university library</td>
</tr>
<tr>
<td align="center" valign="middle">011</td>
<td align="center" valign="middle">Male</td>
<td align="center" valign="middle">34</td>
<td align="left" valign="top">Computer science and technology/software engineering</td>
<td align="left" valign="middle">Police officer</td>
</tr>
<tr>
<td align="center" valign="middle">012</td>
<td align="center" valign="middle">Male</td>
<td align="center" valign="middle">41</td>
<td align="left" valign="middle">Management science</td>
<td align="left" valign="top">Professional staff of the university information centre</td>
</tr>
<tr>
<td align="center" valign="middle">013</td>
<td align="center" valign="middle">Male</td>
<td align="center" valign="middle">38</td>
<td align="left" valign="top">Computer science and technology/software engineering</td>
<td align="left" valign="top">Chief expert of power grid information centre</td>
</tr>
<tr>
<td align="center" valign="middle">014</td>
<td align="center" valign="middle">Female</td>
<td align="center" valign="middle">41</td>
<td align="left" valign="top">Computer science and technology/computer science and technology/communication and information system</td>
<td align="left" valign="middle">Information technology librarian of university library</td>
</tr>
<tr>
<td align="center" valign="middle">015</td>
<td align="center" valign="middle">Male</td>
<td align="center" valign="middle">45</td>
<td align="left" valign="middle">Computer networks/archives</td>
<td align="left" valign="top">Information technology librarian of university library</td>
</tr>
<tr>
<td align="center" valign="middle">016</td>
<td align="center" valign="middle">Male</td>
<td align="center" valign="middle">44</td>
<td align="left" valign="top">Computer science and technology/software engineering</td>
<td align="left" valign="top">Information technology librarian of public library</td>
</tr>
<tr>
<td align="center" valign="top">017</td>
<td align="center" valign="top">Male</td>
<td align="center" valign="top">29</td>
<td align="left" valign="top">Electronic information engineering</td>
<td align="left" valign="top">Enterprise software developer</td>
</tr>
<tr>
<td align="center" valign="top">018</td>
<td align="center" valign="top">Male</td>
<td align="center" valign="top">26</td>
<td align="left" valign="top">Computer science (overseas)</td>
<td align="left" valign="top">Enterprise software developer</td>
</tr>
<tr>
<td align="center" valign="top">019</td>
<td align="center" valign="top">Male</td>
<td align="center" valign="top">26</td>
<td align="left" valign="top">Software engineering/computer science</td>
<td align="left" valign="top">Graduate</td>
</tr>
<tr>
<td align="center" valign="top">020</td>
<td align="center" valign="top">Male</td>
<td align="center" valign="top">26</td>
<td align="left" valign="top">Spatial information and digital technology</td>
<td align="left" valign="top">Front-end development engineer</td>
</tr>
<tr>
<td align="center" valign="middle">021</td>
<td align="center" valign="middle">Male</td>
<td align="center" valign="middle">36</td>
<td align="left" valign="top">Electronic information engineering/signal and information processing</td>
<td align="left" valign="middle">Chief technology officer</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<attrib>Note: The respondents received computer science and related professional degrees from Yunnan University, Hefei University of Technology, Southwest University of Science and Technology, Chongqing University of Posts and Telecommunications, Sichuan University, Xiamen University, Zhejiang University, Central South University, South-Central University for Nationalities, Wuhan University, Xi&#x0027;an University of Architecture and Technology, North China Electric Power University, Kunming University of Science and Technology, Guilin University of Electronic Technology, Dalian University of Technology, Beijing Institute of Technology, Tianjin University and Kalamazoo College.</attrib>
</table-wrap-foot>
</table-wrap>
<p>One-on-one in-depth interviews were conducted, with the consent of the interviewees, and were audio-recorded. The interviews focused on the following nine areas:</p>
<list list-type="simple">
<list-item><label>(1)</label><p>How do you usually manage your personal documents or archives?</p></list-item>
<list-item><label>(2)</label><p>Do you, and how do you, use specialised fixtures and equipment to store and protect paper or physical archives?</p></list-item>
<list-item><label>(3)</label><p>Do you, and how do you, manage your digital documents or archives using digital or online media?</p></list-item>
<list-item><label>(4)</label><p>How do you ensure consistency of file or archive content across multiple storage devices?</p></list-item>
<list-item><label>(5)</label><p>For what purpose do you keep your personal documents or archives?</p></list-item>
<list-item><label>(6)</label><p>Can you accurately locate the personal documents or archives you have retained?</p></list-item>
<list-item><label>(7)</label><p>How do you identify and retrieve retained personal documents or archives?</p></list-item>
<list-item><label>(8)</label><p>How has your expertise or work helped you to manage your personal documents or archives?</p></list-item>
<list-item><label>(9)</label><p>What difficulties and obstacles have you encountered in managing your personal documents or archives?</p></list-item>
</list>
</sec>
</sec>
<sec id="sec4">
<title>Data analysis</title>
<p>This study employed grounded theory, an exploratory research methodology, to code the interview textual material at three levels using the Nvivo 11 Plus qualitative-analysis software. It also refined and revised the composition of computer-science knowledge in the personal-archiving area until theoretical saturation was reached, through an analytical mindset of continuous comparison of the interview textual content.</p>
<sec id="sec4_1">
<title>Open coding</title>
<p>In this study, we labelled the audio-recorded text of the interviews, copy by copy and sentence by sentence. After continuous merging and integration, we deleted the initial concepts of only one material source, and finally obtained thirty-two initial concepts, corresponding to 182 material sources.</p>
<p>Because the number of initial concepts was relatively large, they were reclassified, organised and categorised to finally obtain eleven categories. <xref ref-type="table" rid="T2">Table 2</xref> lists the resulting thirty initial concepts and their corresponding eleven categories, with one original statement listed as an example for each initial concept.</p>
<table-wrap id="T2">
<label>Table 2.</label>
<caption><p>Open coding and its categorisation of computer-science knowledge composition and use mechanism</p></caption>
<table>
<thead>
<tr>
<th align="center" valign="top"><bold>Category</bold></th>
<th align="left" valign="top"><bold>Initial concept (source of material or unit)</bold></th>
<th align="center" valign="top"><bold>Original statement (example)</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="3" align="left" valign="middle">Technical cognition</td>
<td align="left" valign="middle">Computer-related knowledge base affects archiving awareness (12)</td>
<td align="left" valign="top">002: I think the biggest thing that has helped me is computer awareness and storage awareness. I have a better sense of categorisation.</td>
</tr>
<tr>
<td align="left" valign="middle">Good at researching and experimenting with computers and Internet tools (5)</td>
<td align="left" valign="top">001: I think about whether this software or tool will be helpful for me to manage my files. When I see it, I think about how to understand it and use it.</td>
</tr>
<tr>
<td align="left" valign="middle">Understanding the convenience and risks of cloud services (7)</td>
<td align="left" valign="top">016: I&#x0027;m a major in this subject, and netbooks are of the public server type. From my professional point of view, I don&#x0027;t really trust netbooks as a product.</td>
</tr>
<tr>
<td rowspan="4" align="left" valign="middle">Archival purpose</td>
<td align="left" valign="middle">Memory retention (11)</td>
<td align="left" valign="middle">005: For example, the photos may be all about memories. I have to leave a little mark and a thought.</td>
</tr>
<tr>
<td align="left" valign="middle">Recording life (5)</td>
<td align="left" valign="top">021: The personal documents are a record of our personal life.</td>
</tr>
<tr>
<td align="left" valign="middle">Improvement of work efficiency (4)</td>
<td align="left" valign="top">018: I feel that it has improved the efficiency of some aspects of my daily life, work and study.</td>
</tr>
<tr>
<td align="left" valign="middle">Will use again in the future (17)</td>
<td align="left" valign="top">009: Certificates, for example, may be needed in many places throughout your life.</td>
</tr>
<tr>
<td rowspan="3" align="left" valign="middle">Archival habits</td>
<td align="left" valign="middle">Classification and citation of paper archives (6)</td>
<td align="left" valign="top">014: I would write on the outside of the packet of papers, because it wasn&#x0027;t particularly much. When I opened it, I knew who this packet was about. It was equivalent to having a label.</td>
</tr>
<tr>
<td align="left" valign="middle">Centralised storage of paper archives (14)</td>
<td align="left" valign="top">010: Because there aren&#x2019;t that many, there&#x2019;s not one drawer for each thing. It&#x2019;s a little bit more concentrated; maybe several things in one drawer.</td>
</tr>
<tr>
<td align="left" valign="top">Preservation of digital archives using web-based tools (17)</td>
<td align="left" valign="top">019: We take notes when we read papers, and I keep these notes on an online note-taking platform.</td>
</tr>
<tr>
<td rowspan="3" align="left" valign="middle">Archival skills</td>
<td align="left" valign="top">Applying computer technology to archiving (7)</td>
<td align="left" valign="top">003: I can deploy a set of facial recognition tools on my own computer. It&#x2019;s still easier for me to deploy my own locally.</td>
</tr>
<tr>
<td align="left" valign="middle">Comparing performance to choose the best archiving tool (6)</td>
<td align="left" valign="top">014: First was Baidu cloud, and now there is Ali cloud. The Ali cloud stability is not as good as the Baidu cloud. For some Baidu cloud features, I need to buy a membership. Tencent also has a cloud, but the function is not very good and the speed is too slow. Baidu is good to use.</td>
</tr>
<tr>
<td align="left" valign="top">Design clear naming rules for archives (7)</td>
<td align="left" valign="top">017: I name it with words that I usually decide on myself.</td>
</tr>
<tr>
<td rowspan="2" align="left" valign="middle">Archival classification</td>
<td align="left" valign="middle">Saving by subject or content (19)</td>
<td align="left" valign="top">015: One large folder for one year, with several smaller folders underneath, divided into categories such as projects, meetings, extension services and events.</td>
</tr>
<tr>
<td align="left" valign="top">Hierarchical preservation by level of importance (5)</td>
<td align="left" valign="top">017: The personal ones are divided into sensitive, public and general, and will be graded as well.</td>
</tr>
<tr>
<td rowspan="4" align="left" valign="middle">Document naming</td>
<td align="left" valign="middle">Named by time + place or content (11)</td>
<td align="left" valign="top">003: The outermost folder I would name after the date at the time or add a simple location.</td>
</tr>
<tr>
<td align="left" valign="top">Named after the original title (4)</td>
<td align="left" valign="top">009: For general naming, like a file, I use its filename.</td>
</tr>
<tr>
<td align="left" valign="top">Named by purpose of use (2)</td>
<td align="left" valign="top">006: It&#x2019;s usually named after what it&#x2019;s used for.</td>
</tr>
<tr>
<td align="left" valign="middle">Named by version numbers (4)</td>
<td align="left" valign="top">017: I&#x0027;ll change the previous version number; for example, V10 is the tenth version, which means I&#x0027;ve changed it ten times.</td>
</tr>
<tr>
<td align="left" valign="top">Archival sorting</td>
<td align="left" valign="middle">Set serial number ordering for archives (3)</td>
<td align="left" valign="top">001: I like to put 01, 02, 03 in front of the file, so the most important one is in front.</td>
</tr>
<tr>
<td rowspan="2" align="left" valign="middle">Archival security</td>
<td align="left" valign="top">Data privacy and security through encryption (5)</td>
<td align="left" valign="middle">008: I&#x0027;ll scan and make an electronic copy, encrypted.</td>
</tr>
<tr>
<td align="left" valign="middle">Rarely use cloud storage and do not store private archives (17)</td>
<td align="left" valign="top">002: No, because I still think there may be security risks on the internet, and I won&#x0027;t upload documents or personal information. All I have on my netbook now are my study materials.</td>
</tr>
<tr>
<td rowspan="4" align="left" valign="middle">Archival storage</td>
<td align="left" valign="top">Digital preservation of commonly used and important paper archives (13)</td>
<td align="left" valign="top">011: When I use important certificates, I make an electronic copy to archive them.</td>
</tr>
<tr>
<td align="left" valign="middle">Important paper archives are kept in a safe (3)</td>
<td align="left" valign="top">016: The safe isn&#x0027;t very big. It&#x2019;s not for storing possessions, but for storing these important materials.</td>
</tr>
<tr>
<td align="left" valign="top">Important digitised archives are kept on CD-ROM for preservation (4)</td>
<td align="left" valign="top">003: I used to do occasional disc-burning backups for a while.</td>
</tr>
<tr>
<td align="left" valign="top">Paper preservation of important digital archives (2)</td>
<td align="left" valign="top">011: For particularly important documents, I would print out a paper copy for safekeeping.</td>
</tr>
<tr>
<td rowspan="3" align="left" valign="middle">Archival preservation</td>
<td align="left" valign="top">Build a private cloud (e.g., network attached storage) to store and backup archives (6)</td>
<td align="left" valign="top">012: I considered using something called NAS [network attached storage] before.</td>
</tr>
<tr>
<td align="left" valign="top">Regular backups, updates to maintain data consistency (18)</td>
<td align="left" valign="middle">014: After a while, I&#x0027;ll sync the data and back it up.</td>
</tr>
<tr>
<td align="left" valign="middle">Digital archives set up multiple backups (19)</td>
<td align="left" valign="top">002: I have a copy on my own office computer, and I keep a file on my personal computer, as well as my hard drive.</td>
</tr>
<tr>
<td rowspan="3" align="left" valign="middle">Archival retrieval</td>
<td align="left" valign="middle">Level-by-level search according to the classification program (6)</td>
<td align="left" valign="top">005: The numeric category is usually categorised and stored according to a hierarchical structure, which gives me a very clear logic to find things.</td>
</tr>
<tr>
<td align="left" valign="top">Retrieve archives using the find function of the operating system (9)</td>
<td align="left" valign="top">010: I&#x0027;ll use the search function that comes with my computer and do a search using the keywords.</td>
</tr>
<tr>
<td align="left" valign="top">Use tools (e.g., Everything) to retrieve archives (7)</td>
<td align="left" valign="top">017: I can actually find things pretty quickly if I use a tool like Everything.</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="sec4_2">
<title>Axial coding</title>
<p>In this study, the different categories were grouped according to their interrelationships and logical order in the personal-archival behavioural sessions, and a total of five main categories were identified: cognition, archiving, organising, storage and retrieval. Each main category and its corresponding open-coded category are listed in <xref ref-type="table" rid="T3">Table 3</xref>. Compared with the knowledge composition of archivists (<xref ref-type="bibr" rid="R20">Huang <italic>et al</italic>., 2021a</xref>), the main authentication category is missing; however, two main categories of cognition and retrieval have been added, and the storage connotation is richer.</p>
<table-wrap id="T3">
<label>Table 3.</label>
<caption><p>Main categories formed by the axial coding of computer-science knowledge composition and its use mechanisms</p></caption>
<table>
<thead>
<tr>
<th align="left" valign="top"><bold>Main category</bold></th>
<th align="left" valign="top"><bold>Corresponding category</bold></th>
<th align="left" valign="top"><bold>Relationship connotation</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="2" align="left" valign="middle">Cognition</td>
<td align="left" valign="middle">Technical cognition</td>
<td align="left" valign="top">Knowledge of computers and information technology contributes to a better understanding of the performance, benefits and risks of hardware, software and network equipment for personal archiving.</td>
</tr>
<tr>
<td align="left" valign="top">Archival purpose</td>
<td align="left" valign="middle">Archiving pre-conceived behavioural goals and outcomes for individuals.</td>
</tr>
<tr>
<td rowspan="2" align="left" valign="middle">Archiving</td>
<td align="left" valign="top">Archival habits</td>
<td align="left" valign="top">Behavioural habits formed in the practice of personal archiving.</td>
</tr>
<tr>
<td align="left" valign="top">Archival skills</td>
<td align="left" valign="top">Expertise and competence in archiving behaviour.</td>
</tr>
<tr>
<td rowspan="3" align="left" valign="middle">Organising</td>
<td align="left" valign="top">Document classification</td>
<td align="left" valign="middle">Classification methods and programs implemented for personal documents.</td>
</tr>
<tr>
<td align="left" valign="top">Document naming</td>
<td align="left" valign="middle">Relatively stable naming scheme for personal documents.</td>
</tr>
<tr>
<td align="left" valign="top">Document sorting</td>
<td align="left" valign="middle">Arrangement and sorting methods for storing personal documents.</td>
</tr>
<tr>
<td rowspan="3" align="left" valign="middle">Storage</td>
<td align="left" valign="top">Archival security</td>
<td align="left" valign="middle">Strategies adopted to ensure the security of personal records.</td>
</tr>
<tr>
<td align="left" valign="top">Archival preservation</td>
<td align="left" valign="middle">Ways and means adopted to preserve personal records.</td>
</tr>
<tr>
<td align="left" valign="top">Archival protection</td>
<td align="left" valign="middle">Strategies adopted to ensure authenticity, security, integrity and usability.</td>
</tr>
<tr>
<td align="left" valign="top">Retrieval</td>
<td align="left" valign="top">Archival search</td>
<td align="left" valign="top">Search strategies, tools and methods used to access personal records.</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="sec4_3">
<title>Integration</title>
<p>In this study, a typical relational structure of the core categories was constructed arising out of the core topic of computer-science knowledge archived by individuals, as presented in <xref ref-type="table" rid="T3">Tables 3</xref>&#x2013;<xref ref-type="table" rid="T4">4</xref>. It is important to note that the division between knowledge and action is not rigorous or either/or; rather, it is determined based on their primary functions, such as the archiving habit being both a form of knowledge and action.</p>
<fig id="T4">
<label>Table 4.</label>
<caption><p>Typical relational structure of selective coding of computer-science knowledge composition and its utilisation mechanism</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="c1-tab1.jpg"></graphic>
</fig>
<p>We identified the core category of computer-science practitioners as the computer-science knowledge component of personal archiving and found that computer-science knowledge has an impact on personal archiving in the areas of awareness, archiving, organisation, storage and retrieval of personal archives.</p>
<p>We found that the use of computer-science knowledge consists of two aspects: knowledge and action. Knowledge includes technical knowledge, archiving habits and skills, <italic>etc</italic>. This type of professional knowledge is the source of motivation for computer-science practitioners to understand the value of personal archiving and develop it into specific actions for personal archiving. The second aspect involves using knowledge in an action, which includes archival classification, document naming, document sorting, archival security, archival preservation, archival storage and archival management.</p>
<p><italic>Retrieval</italic> is essentially the specific needs of computer-science practitioners to make use of their personal archives and their actions, which leads them to improve the ways and means of archiving, organising and storing their personal archives to increase the efficiency of retrieval. Thus, we have constructed an integrated model of computer-science knowledge composition and use of personal archives, as shown in <xref ref-type="fig" rid="F1">Figure 1</xref>.</p>
<fig id="F1">
<label>Figure 1.</label>
<caption><p>Integration model of computer-science knowledge composition and use of mechanisms for personal archiving</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="c1-fig1.jpg"></graphic>
</fig>
</sec>
<sec id="sec4_4">
<title>Saturation test</title>
<p>In this study, after completing the open coding of the twenty-one interviews, a theoretical saturation test was conducted, based on the thirty-two initial concepts formed by the coding (<xref ref-type="table" rid="T3">Tables 3</xref>&#x2013;<xref ref-type="table" rid="T5">5</xref>). Only one new initial concept appeared in the coding of the interview records from Nos. 007 to 012, and no new initial concepts appeared in the coding of the nine interview records from Nos. 013 to 021, which led to the decision that saturation had been reached.</p>
<table-wrap id="T5">
<label>Table 5.</label>
<caption><p>Focused concepts and number of additions per copy formed by focused coding of computer-science practitioner interview transcripts</p></caption>
<table>
<tbody>
<tr>
<td align="center" valign="top"><bold>Interview transcript number</bold></td>
<td align="center" valign="top">001</td>
<td align="center" valign="top">002</td>
<td align="center" valign="top">003</td>
<td align="center" valign="top">004</td>
<td align="center" valign="top">005</td>
<td align="center" valign="top">006</td>
<td align="center" valign="top">007</td>
<td align="center" valign="top">008</td>
<td align="center" valign="top">009</td>
<td align="center" valign="top">010</td>
<td align="center" valign="top">011</td>
</tr>
<tr>
<td align="center" valign="top"><bold>Focusing on conceptual numbers</bold></td>
<td align="center" valign="top">18</td>
<td align="center" valign="top">16</td>
<td align="center" valign="top">16</td>
<td align="center" valign="top">11</td>
<td align="center" valign="top">12</td>
<td align="center" valign="top">16</td>
<td align="center" valign="top">12</td>
<td align="center" valign="top">16</td>
<td align="center" valign="top">13</td>
<td align="center" valign="top">12</td>
<td align="center" valign="top">12</td>
</tr>
<tr>
<td align="center" valign="top"><bold>Number of additions</bold></td>
<td align="center" valign="top">-</td>
<td align="center" valign="top">5</td>
<td align="center" valign="top">2</td>
<td align="center" valign="top">2</td>
<td align="center" valign="top">1</td>
<td align="center" valign="top">3</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
</tr>
<tr>
<td align="center" valign="top"><bold>Interview transcript number</bold></td>
<td align="center" valign="top">012</td>
<td align="center" valign="top">013</td>
<td align="center" valign="top">014</td>
<td align="center" valign="top">015</td>
<td align="center" valign="top">016</td>
<td align="center" valign="top">017</td>
<td align="center" valign="top">018</td>
<td align="center" valign="top">019</td>
<td align="center" valign="top">020</td>
<td align="center" valign="top">021</td>
<td align="center" valign="top">-</td>
</tr>
<tr>
<td align="center" valign="top"><bold>Focusing on conceptual numbers</bold></td>
<td align="center" valign="top">17</td>
<td align="center" valign="top">13</td>
<td align="center" valign="top">12</td>
<td align="center" valign="top">13</td>
<td align="center" valign="top">7</td>
<td align="center" valign="top">16</td>
<td align="center" valign="top">11</td>
<td align="center" valign="top">7</td>
<td align="center" valign="top">10</td>
<td align="center" valign="top">14</td>
<td align="center" valign="top">-</td>
</tr>
<tr>
<td align="center" valign="top"><bold>Number of additions</bold></td>
<td align="center" valign="top">1</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">-</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="sec5">
<title>Results and discussion</title>
<sec id="sec5_1">
<title>Composition of personal-archiving computer knowledge</title>
<p>The coding in <xref ref-type="table" rid="T3">Table 3</xref> shows that the computer-science knowledge involved in personal archiving is a body of knowledge that consists of a combination of cognition, archiving, organisation, storage and retrieval. This is in line with the core knowledge points directed by researchers in the field of computer science working on the collection, organisation, storage, retrieval and tool development for the general public (<xref ref-type="bibr" rid="R2">Al-Omar and Cox, 2016</xref>; <xref ref-type="bibr" rid="R46">Zhan, 2018</xref>; <xref ref-type="bibr" rid="R45">Yeo and Li, 2014</xref>; <xref ref-type="bibr" rid="R35">Sinn <italic>et al</italic>., 2019</xref>; <xref ref-type="bibr" rid="R40">Warraich <italic>et al</italic>., 2018</xref>), as well as the acquisition, classification, storage and retrieval of personal archives from a technological perspective (<xref ref-type="bibr" rid="R3">Barreau, 1995</xref>; <xref ref-type="bibr" rid="R8">Boardman and Sasse, 2004</xref>), which are subdivided as follows.</p>
<sec id="sec5_1_1">
<title>Cognition: efficiency and technical rationality</title>
<p>Cognition can be further subdivided into two subsets of knowledge: archival purposes and technical cognition.</p>
<p>The purposes of archiving consist of four aspects: to preserve memories, to record life, to increase productivity and to be used again in the future. This finding is similar to the qualitative findings of the researcher&#x2019;s interviews with archivists (<xref ref-type="bibr" rid="R20">Huang <italic>et al</italic>., 2021a</xref>), but has some differences. There are fewer subsets of preserving evidence and preserving heritage and passing on culture for next generation, but there are two more initial sets of documenting life and improving work efficiency, reflecting the rationality of computer-science practitioners&#x0027; efficiency in personal archiving.</p>
<p>Technology awareness consists of three dimensions: computer-related knowledge base affects archival awareness, being good at researching and experimenting with computers and internet tools and understanding the convenience and risks of cloud services. These perceptions highlight the strong professionalism of computer-science practitioners, which is centred on their ability to understand the principles and performance of commercially available personal computers, USB, CD-ROMs, and hard disks, as well as the principles and performance of computers, network hardware and software equipment and tools, such as the Internet, network devices, cloud storage and cloud services, and to identify and make use of available tools to implement their personal-archiving activities and ensure their security, integrity and usability.</p>
</sec>
<sec id="sec5_1_2">
<title>Archiving: common sense and professionalism go hand in hand</title>
<p>In terms of coding, archival habits and skills together constitute the archiving dimension of knowledge.</p>
<p>For archival habits, three initial concepts were identified: classifying and labelling paper archives, centralised storage of paper archives, and use of web-based tools for digital archives. Paper archives were classified and labelled mainly for ease of reference and access. Because of their small number, respondents generally indicated that their paper archives were stored in fixed drawers, bookcases, <italic>etc</italic>., which is a notable common-sense feature.</p>
<p>Compared to paper archives, digital archives are large in number, rich in formats, and wide in range; they are mostly archived through tools, such as applications (020: Dingding), computer software (009: EndNote), and online platforms (007: GitHub). Using specialised tools in the field of computer science (e.g., GitHub) and a wide range of software tools is becoming the norm.</p>
<p>In terms of archival skills, three initial concepts were identified: applying computer technology to archiving, comparing performance to choose the best archiving tool and designing clear naming conventions for documents. These skills indicate that computer practitioners apply software-development project skills and work practices to personal archiving. Moreover, they are more adept at solving archiving problems through technology compared to non-computer professionals, such as &#x2018;<italic>called an interface and wrote an encrypted applet</italic>&#x2019; (006) to encrypt important documents, and &#x2018;<italic>deployed a set of face-recognition tools on my own computer</italic>&#x2019; (003) to identify and retrieve a large number of photo archives, <italic>etc</italic>. This greatly improved the security of archives and the convenience of retrieval. In addition, using computer expertise, skills and tools has become the most distinctive feature of archivists&#x2019; personal-archiving behaviour.</p>
</sec>
<sec id="sec5_1_3">
<title>Organisation: understanding computer rules</title>
<p>The organisation category consists of two subsets of knowledge: archival classification and naming.</p>
<p>Archival classification includes the initial concepts of preservation by subject or content and preservation by level of importance. Most of the interviewees classified files by subject or content, especially work-related personal digital files, which were classified into many categories, such as &#x2018;<italic>projects, meetings, promotional services and activities</italic>&#x2019; by Interviewee 015. In addition, as archivists are familiar with the confidentiality level of archives, computer practitioners are aware of the confidentiality level of projects. Their work has influenced the formation of a classification system that preserves files according to their level of importance.</p>
<p>Archival naming includes four initial concepts of naming by (1) time and place or content, (2) original title, (3) purpose of use and (4) version number. Specifically, photos and videos are mainly named according to the time and place, or content; announcements and notices are mainly named according to the title of the document; and certificates and documents are mainly named according to their purpose of use. Documents that need to be modified several times include a date or version number to prevent them from being overwritten or lost.</p>
<p>Overall, computer-science practitioners are better able than archivists to understand computer storage, retrieval and organisational rules in terms of naming archival documents, and to flexibly apply knowledge, such as version numbers of computer software, to personal archiving.</p>
</sec>
<sec id="sec5_1_4">
<title>Storage: safety first</title>
<p>Storage can be divided into three knowledge subsets: archival security, preservation, and protection.</p>
<p>Archival security consists of two initial concepts: ensuring data privacy and security through encryption, and rarely using cloud storage and not storing private documents there. Professional backgrounds make computer practitioners more concerned about information security. Knowing that cloud services have security risks of information leakage, the respondents said that they store materials that can be made public and are not confidential (013), and they choose to store private and highly important documents locally. They also encrypt the data on the local device before uploading it to the cloud platform (019) to further ensure the privacy of the data.</p>
<p>Archive preservation consists of four initial concepts: digitally preserve commonly used and important paper documents, safely keep important paper documents, burn important digital documents onto CD-ROMs and preserve paper copies of important digital documents. Computer practitioners mainly use multi-carrier storage for archival preservation. Digitising paper files can improve their ease of use and materialising digital files can aid in long-term preservation.</p>
<p>Archive protection consists of three initial concepts: setting up a private cloud (<italic>e.g</italic>., NAS) to store and back up documents, making regular backups and updates to maintain data consistency and setting up multiple backups of digitised documents. As mentioned earlier, the public cloud has the potential for information leakage, and &#x2018;<italic>building a private cloud [using my] own expertise</italic>&#x2019; (005) helps enhance data security and privacy protection. In addition, regular and multiple backups ensure the integrity and availability of the archives.</p>
</sec>
<sec id="sec5_1_5">
<title>Retrieval: tools first</title>
<p>Archival retrieval is a relatively self-contained knowledge component that can be subdivided into three initial concepts: searching hierarchically according to a classification scheme, retrieving a document using the search function of an operating system, and retrieving a document using a tool (<italic>e.g</italic>., Everything). Their professional background and nature of work make computer practitioners familiar with data structures and good at applying them to organising and retrieving files.</p>
<p>The prerequisite for a file retrieval is that the files have been well organised in the preliminary separation and organisation activities. For example, classifying and storing the files according to a hierarchical structure (005), which makes the retrieval logic clear, and paying attention when naming documents (008) enables the system search function to meet daily needs.</p>
<p>In terms of retrieval, computer practitioners paid more attention to studying and trying various tools and applying them to personal-record management, such as Everything (002), Anything (013), and AnyTXT (003).</p>
</sec>
</sec>
<sec id="sec5_2">
<title>Applying archival knowledge to personal archiving</title>
<p>The interviews revealed that computer-science practitioners have a more comprehensive understanding of the purpose of archiving. They classify and categorise paper archives and use safes for important paper documents. They also digitise frequently used and important paper documents and keep important digital documents in paper form. This is the general public&#x2019;s way of keeping personal records, and was the norm for personal archiving before the spread of digitisation and Internet access.</p>
<p>However, in contrast to the interviews with archivists (<xref ref-type="bibr" rid="R20">Huang <italic>et al</italic>., 2021a</xref>), computer-science practitioners were not concerned with what to keep (the selection criteria), or the value of the archives they kept, or even the retention of and access to personal paper archives. This is another example of personal archiving as a common-sense endeavour or task. However, the specialised nature of computer-science knowledge is still well represented and used in practical personal archiving.</p>
<sec id="sec5_2_1">
<title>Demand-driven</title>
<p>When computer-science practitioners use their computer-science expertise for personal archiving, they do not simply apply the tools of their expertise, but adapt and optimise them as needed to locate and retrieve personal files. For example, the emphasis on storing personal documents in common formats and designing clear naming rules for documents was developed after encountering difficulties in retrieving personally stored documents using good retrieval tools (<italic>e.g</italic>., Everything). Alternatively, it was only after the need for retrieval arose that the naming convention for personal documents was developed and optimised for retrieval.</p>
<p>It is very likely that computer-science practitioners&#x0027; research on personal archiving also stems from their practical archiving needs. Whether it is developing tools, designing and optimising algorithms for annotation and retrieval of personal archives, or designing and optimising annotation and retrieval algorithms (<xref ref-type="bibr" rid="R47">Zhao <italic>et al</italic>., 2014</xref>), the researcher&#x2019;s intention is not to serve others, but to facilitate their own needs. Some of our interviewees indicated that they considered designing their own software to facilitate more efficient storage and retrieval of personal archives (013).</p>
</sec>
<sec id="sec5_2_2">
<title>Knowledge determines action</title>
<p>Computer-science practitioners have a more profound understanding of computers and networks. Their relevant professional knowledge ranges from archival habits and skills, to document naming and sorting, file security, preservation and protection, and even file retrieval and other personal archives, throughout the entire process. This knowledge can be applied to the naming of documents, flexible use of programming specifications (such as the Alibaba programming specifications), using a software version number for different versions of documents, depending on the computer operating system&#x2019;s file or folder sorting rules, and developing personal document sorting.</p>
<p>Computer-science expertise is also put to good use in the preservation of files, such as setting up a private cloud and using GitHub, syntax, and other tools in the computer industry to manage and synchronise personal files. In other words, computer-science expertise essentially determines the strategies, tools, and methods used by its practitioners to retain, organise and preserve personal archives.</p>
</sec>
</sec>
</sec>
<sec id="sec6">
<title>Implications</title>
<p>This study found that the computer-science knowledge and skills involved in personal archiving mainly focus on the working principles and performance of computer- and network-related software and hardware devices; the storage, organisation, and retrieval rules of operating systems and databases; and various software tools that can meet personal archiving needs. These components represent the core knowledge and skills associated with computer literacy. At the same time, it was found that owing to the higher level of computer literacy among computer-science practitioners, they have a stronger need for personal archiving and higher personal archiving efficiency. The findings of this study can provide constructive suggestions for improving the body of knowledge in the personal-archiving field and promoting public personal archiving.</p>
<sec id="sec6_1">
<title>Computer literacy is an indispensable knowledge component of personal archiving</title>
<p>Interviews with computer-science practitioners revealed that they were well able to organise and maintain their personal digital archives using their computer-science knowledge and skills. This is an important dilemma faced by archivists in the digital age (lack of tools, archival ocean, digitisation anxiety, <italic>etc</italic>.). The deep understanding and knowledge of computers, networks and digitisation devices by computer-science practitioners is a cure for digitisation anxiety. The good use of search tools is an essential tool for dealing with the archival ocean.</p>
<p>For the public, acquiring the necessary computer and network knowledge and skills is essentially about improving one&#x2019;s computer literacy, which is generally defined as &#x2018;<italic>an individual&#x2019;s ability to use [information and communication technology] appropriately to access, manage, and evaluate information, develop new understanding, and communicate with others&#x2019;</italic> (<xref ref-type="bibr" rid="R17">Fraillon <italic>et al</italic>., 2019</xref>). Education and guidance on personal archiving should not be limited to the development of guidelines for family archiving (<xref ref-type="bibr" rid="R44">Yang, 2018</xref>) and guidelines for personal archiving (<xref ref-type="bibr" rid="R29">Library of Congress, 2021</xref>). It should also include the knowledge, skills and understanding of risks associated with equipment, tools and methods for organising, storing and retrieving personal archives, which are closely related to personal digital archiving.</p>
</sec>
<sec id="sec6_2">
<title>Improving efficiency is a viable way to increase personal motivation for archiving</title>
<p>In contrast to the archivist interviews, computer-science practitioners rarely mentioned a lack of motivation, archival ocean, or digitisation anxiety associated with personal archiving. This is partly because of the obvious efficiency rationale of their archiving purpose. They recognise that personal archiving can improve productivity. In addition, they have more pragmatic and efficient tools to store and retrieve personal files. They rarely feel distressed or anxious about the large number of files because they are accustomed to working with a large amount of data; therefore, to them, personal digital files are simply a small dataset.</p>
<p>More importantly, computer-science practitioners are adept at using (and sometimes developing) tools that improve the storage and retrieval of personal records without much difficulty. Therefore, to increase the motivation, ability, and efficiency of the public to archive their personal records, it is important to develop and disseminate convenient and efficient tools for managing personal records, in addition to strengthening computer literacy education.</p>
</sec>
<sec id="sec6_3">
<title>Stimulating demand is an endogenous dynamic for enhancing personal archiving actions</title>
<p>Research has found that awareness of the value and utility of personal archives plays a leading role in the knowledge application mechanism of archivists (<xref ref-type="bibr" rid="R20">Huang <italic>et al</italic>., 2021a</xref>), while the storage and retrieval demands of personal archives play a crucial role in the knowledge application mechanism of computer-science practitioners. Archivists and computer-science practitioners have different knowledge systems and practical experiences, and their different knowledge application mechanisms can provide guidance for us to better understand personal archiving knowledge training.</p>
<p>The need for personal archiving is superficial, and its core lies in the understanding of the value and role of personal archives, that is, the awareness of retaining, organising, and using archives. Therefore, to enhance the endogenous motivation of personal archives, it is necessary to make individuals understand what personal archives are, their value and role, and their benefits to individuals, families, and society.</p>
</sec>
</sec>
<sec id="sec7">
<title>Conclusions</title>
<p>Personal archiving, specifically personal digital archiving, has attracted the attention of researchers in library and information science as well as computer science. However, for the public&#x2019;s personal archiving, the type of computer-science knowledge that can be applied, and whether it has become the exclusive right of computer-science practitioners owing to technical barriers, have not been answered by existing research, and this study made beneficial attempts.</p>
<p>This study showed that computer-science knowledge is embodied in the cognition, archiving, organisation, storage and retrieval of personal archives. Computer science and technology cognition are the core, mainly focusing on archiving skills, document naming and sorting, archival security and storage, and archival retrieval in the midst of knowledge and action. Computer-science practitioners exhibit common-sense regarding paper archives, but their professionalism in managing, maintaining, and accessing personal digital archives was highlighted, which is mainly reflected by the following three aspects.</p>
<p>First, these practitioners have a good understanding of the working principles and performance of software and hardware devices related to computers and networks. Therefore, they are better able to understand the characteristics, advantages, and potential risks of commercial systems including common personal computers, USB drives, CDs, hard drives, and cloud storage. They particularly value the privacy and security of personal digital archives and can use relevant equipment to manage personal digital archives in a reasonable manner.</p>
<p>Second, they have knowledge, skills, and practical experience related to software development and are better able to understand the storage, organisation, and retrieval rules of operating systems and databases. They can flexibly apply knowledge such as the file management rules of operating systems and naming conventions of computer software to personal digital archives to meet daily management and retrieval needs.</p>
<p>Third, they are adept at using various tools to meet their personal archiving needs. These respondents were adept at using commercial software tools to manage personal digital archives, including using facial recognition tools to manage photo archives, constructing a private cloud (such as NAS) to store and backup personal digital documents, and using tools such as Everything to retrieve personal digital documents.</p>
<p>Our findings indicate that computer science techniques are not involved in the design and optimisation of algorithms and system development. The computer-science knowledge composition in the field of personal archiving is similar to the knowledge requirements for computer literacy. Specifically, it is the understanding and application of computer and network fundamentals, such as the composition of computer and network systems, values, data, hardware, programming, <italic>etc.</italic>, that have a substantial impact on the personal-archiving practices of computer-science practitioners.</p>
<p>In short, the application of computer-science knowledge in the personal-archiving domain is almost exclusively focused on computer literacy, meaning that non-computer-science practitioners can acquire these knowledge and skills. It also suggests that the value of constructing a personal-archiving knowledge system is that the public or archivists implementing it do not necessarily need to receive a specialised computer-science education, but should have basic computer literacy. In other words, basic knowledge in the fields of computers and networks, information organisation, and retrieval must be incorporated into a personal-archiving knowledge system, so that the public can make full and rational use of a variety of platforms and tools, based on an understanding of the principles of computers and networks, to improve the efficiency of personal archiving.</p>
<p>This study also found that in their personal-archival behaviour, computer-science practitioners have formed demand-driven and knowledge-determined action mechanisms. These mechanisms differ from and are complementary to the knowledge-application mechanisms of archivists, which primarily concern the awareness of personal archives (<xref ref-type="bibr" rid="R20">Huang <italic>et al</italic>., 2021a</xref>).</p>
<p>The demand comes from external needs, while consciousness comes from internal drives. The different knowledge application mechanisms of the computer-science practitioners and archivists reveal that archival knowledge and computer-science knowledge have their own strengths. To further enhance the motivation of personal archiving, it is necessary to further integrate knowledge and tools from different fields.</p>
<p>One limitation of this study is the composition of the sample of computer-science practitioners interviewed. Although a theoretical sample was conducted, it was only possible to sample from those with whom we could make connections and those who were willing to participate. Therefore, the sample may have been biased because it was not a random selection of all computer-science practitioners.</p>
<p>Finally, personal archiving is a common phenomenon in people&#x2019;s lives. While we explored the issue of knowledge composition and use mechanisms in the field of archiving in our previous study, this study focused on the knowledge composition and use mechanisms in the field of computer science. Whether other disciplines and fields have more distinctive knowledge systems and use mechanisms remains to be further explored.</p>
</sec>
<sec id="sec8">
<title>Copyright</title>
<p>Authors contributing to <italic>Information Research</italic> agree to publish their articles under a Creative Commons CC BY-NC 4.0 license, which gives third parties the right to copy and redistribute the material in any medium or format. It also gives third parties the right to remix, transform and build upon the material for any purpose, except commercial, on the condition that clear acknowledgment is given to the author(s) of the work, that a link to the license is provided and that it is made clear if changes have been made to the work. This must be done in a reasonable manner, and must not imply that the licensor endorses the use of the work by third parties. The author(s) retain copyright to the work. You can also read more at: <ext-link ext-link-type="uri" xlink:href="https://publicera.kb.se/ir/openaccess">https://publicera.kb.se/ir/openaccess</ext-link></p>
</sec>
</body>
<back>
<ref-list>
<title>References</title>
<ref id="R1"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Ai</surname><given-names>C.</given-names></name><name><surname>Liu</surname><given-names>J.</given-names></name><name><surname>Fan</surname><given-names>C.</given-names></name><name><surname>Zhang</surname><given-names>X.</given-names></name><name><surname>Zou</surname><given-names>J.</given-names></name></person-group><year>2011</year><chapter-title>Enhancing personal information security on Android with a new synchronization scheme</chapter-title><source>7th International Conference on Wireless Communications, Networking and Mobile Computing</source><publisher-name>IEEE</publisher-name><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/wicom.2011.6040155">https://doi.org/10.1109/wicom.2011.6040155</ext-link></element-citation></ref>
<ref id="R2"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Al-Omar</surname><given-names>M.</given-names></name><name><surname>Cox</surname><given-names>A. M.</given-names></name></person-group><year>2016</year><article-title>Scholars&#x0027; research-related personal information collections: a study of education and health researchers in a Kuwaiti university</article-title><source>Aslib Journal of Information Management</source><volume>68</volume><issue>2</issue><fpage>155</fpage><lpage>173</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/AJIM-04-2015-0069">https://doi.org/10.1108/AJIM-04-2015-0069</ext-link></element-citation></ref>
<ref id="R3"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Barreau</surname><given-names>D. K.</given-names></name></person-group><year>1995</year><article-title>Context as a factor in personal information management systems</article-title><source>Journal of the American Society for Information Science</source><volume>46</volume><issue>5</issue><fpage>327</fpage><lpage>339</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1002/(SICI)10974571(199506)46:5&#x003C;327::AID-ASI4&#x003E;3.0.CO;2-C">https://doi.org/10.1002/(SICI)10974571(199506)46:5&#x003C;327::AID-ASI4&#x003E;3.0.CO;2-C</ext-link></element-citation></ref>
<ref id="R4"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Becker</surname><given-names>D.</given-names></name><name><surname>Nogues</surname><given-names>C.</given-names></name></person-group><year>2012</year><article-title>Saving-over, over-saving, and the future mess of writers&#x0027; digital archives: a survey report on the personal digital archiving practices of emerging writers</article-title><source>The American Archivist</source><volume>75</volume><issue>2</issue><fpage>482</fpage><lpage>513</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.17723/aarc.75.2.t024180533382067">https://doi.org/10.17723/aarc.75.2.t024180533382067</ext-link></element-citation></ref>
<ref id="R5"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Bergman</surname><given-names>O.</given-names></name><name><surname>Tucker</surname><given-names>S.</given-names></name><name><surname>Beyth-Marom</surname><given-names>R.</given-names></name><name><surname>Cutrell</surname><given-names>E.</given-names></name><name><surname>Whittaker</surname><given-names>S.</given-names></name></person-group><year>2009</year><chapter-title>It&#x2019;s not that important: demoting personal information of low subjective importance using GrayArea</chapter-title><source>CHI &#x0027;09: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source><publisher-name>ACM</publisher-name><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/1518701.1518745">https://doi.org/10.1145/1518701.1518745</ext-link></element-citation></ref>
<ref id="R6"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Bergman</surname><given-names>O.</given-names></name><name><surname>Whittaker</surname><given-names>S.</given-names></name><name><surname>Frishman</surname><given-names>Y.</given-names></name></person-group><year>2019</year><article-title>Let&#x2019;s get personal: the little nudge that improves document retrieval in the Cloud</article-title><source>Journal of Documentation</source><volume>75</volume><issue>2</issue><fpage>379</fpage><lpage>396</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/JD-06-2018-0098">https://doi.org/10.1108/JD-06-2018-0098</ext-link></element-citation></ref>
<ref id="R7"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Berlin</surname><given-names>J. A.</given-names></name><name><surname>Kelly</surname><given-names>M.</given-names></name><name><surname>Nelson</surname><given-names>M. L.</given-names></name><name><surname>Weigle</surname><given-names>M. C</given-names></name></person-group><year>2017</year><chapter-title>WAIL: collection-based personal web archiving</chapter-title><source>JCDL &#x0027;17: 17th ACM/IEEE-CS Joint Conference on Digital Libraries</source><publisher-name>IEEE</publisher-name><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/JCDL.2017.7991619">https://doi.org/10.1109/JCDL.2017.7991619</ext-link></element-citation></ref>
<ref id="R8"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Boardman</surname><given-names>R.</given-names></name><name><surname>Sasse</surname><given-names>M. A.</given-names></name></person-group><year>2004</year><article-title>Stuff goes into the computer and doesn&#x0027;t come out: a crosstool study of personal information management</article-title><source>ACM Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source><fpage>583</fpage><lpage>590</lpage><ext-link ext-link-type="uri" xlink:href="https://doi/10.1145/985692.985766">https://doi/10.1145/985692.985766</ext-link></element-citation></ref>
<ref id="R9"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Burrows</surname><given-names>T.</given-names></name></person-group><year>2006</year><article-title>Personal electronic archives: collecting the digital me</article-title><source>OCLC Systems &#x0026; Services: International Digital Library Perspectives</source><volume>22</volume><issue>2</issue><fpage>85</fpage><lpage>88</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/10650750610663932">https://doi.org/10.1108/10650750610663932</ext-link></element-citation></ref>
<ref id="R10"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Chen</surname><given-names>M.</given-names></name><name><surname>Jiang</surname><given-names>Y.</given-names></name><name><surname>Tian</surname><given-names>F.</given-names></name><name><surname>Dai</surname><given-names>G.</given-names></name></person-group><year>2010</year><article-title>Ruby: a personal information management system for mobile environment</article-title><source>Journal of Computer-Aided Design &#x0026; Computer Graphics</source><volume>22</volume><issue>9</issue><fpage>1475</fpage><lpage>1482</lpage><ext-link ext-link-type="uri" xlink:href="https://www.jcad.cn/en/article/id/e97c7255-0cfd-4acc-be40-fe12b89700cb">https://www.jcad.cn/en/article/id/e97c7255-0cfd-4acc-be40-fe12b89700cb</ext-link></element-citation></ref>
<ref id="R11"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Chen</surname><given-names>X.</given-names></name><name><surname>Wang</surname><given-names>F.</given-names></name></person-group><year>2021</year><article-title>A paradox of the double-track promotion for university counselors&#x2014;a study based on the grounded theory</article-title><source>Educational Research</source><volume>42</volume><issue>2</issue><fpage>80</fpage><lpage>96</lpage><ext-link ext-link-type="uri" xlink:href="https://www.cnaes.edu.cn/jyyj/jyyj_gqml/202103/t20210303_336856.html">https://www.cnaes.edu.cn/jyyj/jyyj_gqml/202103/t20210303_336856.html</ext-link></element-citation></ref>
<ref id="R12"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Chen</surname><given-names>Z.</given-names></name><name><surname>Zhu</surname><given-names>Y.</given-names></name></person-group><year>2017</year><chapter-title>Personal archive service system using block chain technology: case study, promising and challenging</chapter-title><source>2017 IEEE International Conference on AI &#x0026; Mobile Services (AIMS)</source><publisher-name>IEEE</publisher-name><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/AIMS.2017.31">https://doi.org/10.1109/AIMS.2017.31</ext-link></element-citation></ref>
<ref id="R13"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Corbin</surname><given-names>J.</given-names></name><name><surname>Strauss</surname><given-names>A.</given-names></name></person-group><year>1990</year><article-title>Grounded theory research: procedures, canons, and evaluative criteria</article-title><source>Qualitative Sociology</source><volume>19</volume><issue>6</issue><fpage>418</fpage><lpage>427</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1515/zfsoz-1990-0602">https://doi.org/10.1515/zfsoz-1990-0602</ext-link></element-citation></ref>
<ref id="R14"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Corbin</surname><given-names>J.</given-names></name><name><surname>Strauss</surname><given-names>A.</given-names></name></person-group><year>2015</year><source>Basics of qualitative research: techniques and procedures for developing grounded theory</source><publisher-name>SAGE Publications, Inc</publisher-name></element-citation></ref>
<ref id="R15"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cushing</surname><given-names>A. L.</given-names></name></person-group><year>2016</year><article-title>&#x2018;If it computes, patrons have brought it in&#x2019;: personal information management and personal technology assistance in public libraries</article-title><source>Library &#x0026; Information Science Research</source><volume>38</volume><issue>1</issue><fpage>81</fpage><lpage>88</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.lisr.2016.01.005">https://doi.org/10.1016/j.lisr.2016.01.005</ext-link></element-citation></ref>
<ref id="R16"><element-citation publication-type="web"><collab>Dictionary Working Group of the Society of American Archivists</collab><year>2024</year><source>Dictionary of Archives Terminology</source><comment>2021-06-17</comment><ext-link ext-link-type="uri" xlink:href="https://dictionary.archivists.org/entry/personal-archive.html">https://dictionary.archivists.org/entry/personal-archive.html</ext-link></element-citation></ref>
<ref id="R17"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Fraillon</surname><given-names>J.</given-names></name><name><surname>Ainley</surname><given-names>J.</given-names></name><name><surname>Schulz</surname><given-names>W.</given-names></name><name><surname>Duckworth</surname><given-names>D.</given-names></name><name><surname>Friedman</surname><given-names>T.</given-names></name></person-group><year>2019</year><chapter-title>Computer and information literacy framework</chapter-title><source>IEA International Computer and Information Literacy Study 2018 Assessment Framework</source><publisher-name>Springer</publisher-name><fpage>16</fpage><ext-link ext-link-type="uri" xlink:href="https://link.springer.com/chapter/10.1007/978-3-031-61194-0_2">https://link.springer.com/chapter/10.1007/978-3-031-61194-0_2</ext-link></element-citation></ref>
<ref id="R18"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Guo</surname><given-names>X. M.</given-names></name></person-group><year>2018</year><article-title>An empirical study on the mediating effect of personal digital archiving behavior: based on a random questionnaire survey of Chinese netizens</article-title><source>Archives Science Bulletin</source><issue>5</issue><fpage>17</fpage><lpage>25</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.16113/j.cnki.daxtx.2018.05.005">https://doi.org/10.16113/j.cnki.daxtx.2018.05.005</ext-link></element-citation></ref>
<ref id="R19"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hand</surname><given-names>M.</given-names></name></person-group><year>2016</year><article-title>Persistent traces, potential memories: smartphones and the negotiation of visual, locative, and textual data in personal life</article-title><source>Convergence</source><volume>22</volume><issue>3</issue><fpage>269</fpage><lpage>286</lpage><ext-link ext-link-type="uri" xlink:href="https://journals.sagepub.com/doi/10.1177/1354856514546094">https://journals.sagepub.com/doi/10.1177/1354856514546094</ext-link></element-citation></ref>
<ref id="R20"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Huang</surname><given-names>T.</given-names></name><name><surname>Nie</surname><given-names>R.</given-names></name><name><surname>Zhao</surname><given-names>Y.</given-names></name></person-group><year>2021</year><article-title>Archival knowledge in the field of personal archiving: an exploratory study based on grounded theory</article-title><source>Journal of Documentation</source><volume>77</volume><issue>1</issue><fpage>19</fpage><lpage>40</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/JD-04-2020-0071">https://doi.org/10.1108/JD-04-2020-0071</ext-link></element-citation></ref>
<ref id="R21"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Huang</surname><given-names>T.</given-names></name><name><surname>Nie</surname><given-names>R.</given-names></name><name><surname>Zhong</surname><given-names>Z.</given-names></name></person-group><year>2021</year><article-title>The challenges and its solvable logics of personal archiving in digital age: a grounded theory study based on archivists&#x0027; interview records</article-title><source>Archives Science Study</source><issue>1</issue><fpage>110</fpage><lpage>115</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.16065/j.cnki.issn1002-1620.2021.01.015">https://doi.org/10.16065/j.cnki.issn1002-1620.2021.01.015</ext-link></element-citation></ref>
<ref id="R22"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Huang</surname><given-names>T.</given-names></name><name><surname>Zhong</surname><given-names>Z.</given-names></name></person-group><year>2021</year><article-title>Development and empirical study of a personal archiving dilemma scale</article-title><source>Library and Information Service</source><volume>65</volume><issue>17</issue><fpage>101</fpage><lpage>109</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.13266/j.issn.0252-3116.2021.17.010">https://doi.org/10.13266/j.issn.0252-3116.2021.17.010</ext-link></element-citation></ref>
<ref id="R23"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>John</surname><given-names>J.L.</given-names></name><name><surname>Rowlands</surname><given-names>I.</given-names></name><name><surname>Williams</surname><given-names>P.</given-names></name><name><surname>Dean</surname><given-names>K.</given-names></name></person-group><year>2010</year><article-title>Digital lives: Personal digital archives for the 21century &#x003E;&#x003E; an initial synthesis (Beta Version 0.1A)</article-title><source>Digital Lives Research Paper</source><fpage>98</fpage><ext-link ext-link-type="uri" xlink:href="https://britishlibrary.typepad.co.uk/files/digital-lives-synthesis01a.pdf">https://britishlibrary.typepad.co.uk/files/digital-lives-synthesis01a.pdf</ext-link></element-citation></ref>
<ref id="R24"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Jones</surname><given-names>W.</given-names></name><name><surname>Klasnja</surname><given-names>P.</given-names></name><name><surname>Civan</surname><given-names>A.</given-names></name><name><surname>Adcock</surname><given-names>M. L</given-names></name></person-group><year>2008</year><chapter-title>The personal project planner: planning to organize personal information</chapter-title><source>CHI &#x0027;08: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source><publisher-name>ACM</publisher-name><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/1357054.1357162">https://doi.org/10.1145/1357054.1357162</ext-link></element-citation></ref>
<ref id="R25"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kuny</surname><given-names>T.</given-names></name></person-group><year>1998</year><article-title>The digital dark ages? Challenges in the preservation of electronic information</article-title><source>International Preservation News</source><volume>17</volume><issue>2</issue><fpage>9</fpage><lpage>18</lpage><ext-link ext-link-type="uri" xlink:href="https://www.ifla.org/wp-content/uploads/files/assets/pac/ipn/17-98.pdf">https://www.ifla.org/wp-content/uploads/files/assets/pac/ipn/17-98.pdf</ext-link></element-citation></ref>
<ref id="R26"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Lee</surname><given-names>C. A.</given-names></name></person-group><year>2011</year><source>I, Digital: Personal Collections in the Digital Era</source><publisher-name>Society of American Archivists</publisher-name></element-citation></ref>
<ref id="R27"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Li</surname><given-names>L.</given-names></name></person-group><year>2021</year><article-title>Research on classification management and encryption protection of personal digital archives in big data environment</article-title><source>Archives Management</source><issue>6</issue><fpage>57</fpage><lpage>58</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.15950/j.cnki.1005-9458.2021.06.021">https://doi.org/10.15950/j.cnki.1005-9458.2021.06.021</ext-link></element-citation></ref>
<ref id="R28"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Li</surname><given-names>X.</given-names></name></person-group><year>2011</year><article-title>Research and improvement of demoting personal information of low importance based on Gray-Area</article-title><source>Computer Engineering and Design</source><volume>32</volume><issue>10</issue><fpage>3544</fpage><lpage>3547</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.16208/j.issn1000-7024.2011.10.060">https://doi.org/10.16208/j.issn1000-7024.2011.10.060</ext-link></element-citation></ref>
<ref id="R29"><element-citation publication-type="book"><collab>Library of Congress</collab><year>2021</year><source>Personal archiving: preserving your digital memories</source><comment>2021-06-17</comment><ext-link ext-link-type="uri" xlink:href="https://www.digitalpreservation.gov/personalarchiving/">https://www.digitalpreservation.gov/personalarchiving/</ext-link></element-citation></ref>
<ref id="R30"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Liu</surname><given-names>C.</given-names></name><name><surname>Zhu</surname><given-names>M.</given-names></name></person-group><year>2013</year><chapter-title>Design and implementation of personal information management system in Internet</chapter-title><source>Proceedings of the 2013 International Conference on Information, Business and Education Technology</source><publisher-name>Atlantis Press</publisher-name><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2991/icibet.2013.206">https://doi.org/10.2991/icibet.2013.206</ext-link></element-citation></ref>
<ref id="R31"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Liu</surname><given-names>Y.</given-names></name><name><surname>Zhou</surname><given-names>W.</given-names></name><name><surname>Li</surname><given-names>X.</given-names></name></person-group><year>2022</year><article-title>Value driving and demand guiding: development trends of archival science during the 14th five-year plan period</article-title><source>Journal of Information Resources Management</source><volume>12</volume><issue>05</issue><fpage>14</fpage><lpage>24</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.13365/j.jirm.2022.05.014">https://doi.org/10.13365/j.jirm.2022.05.014</ext-link></element-citation></ref>
<ref id="R32"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Marshall</surname><given-names>C. C.</given-names></name></person-group><year>2008</year><article-title>Rethinking personal digital archiving, Part 1: four challenges from the field</article-title><source>D-Lib Magazine</source><volume>14</volume><issue>3</issue><ext-link ext-link-type="uri" xlink:href="http://webdoc.gwdg.de/edoc/aw/d-lib/dlib/march08/marshall/03marshall-pt1.html">http://webdoc.gwdg.de/edoc/aw/d-lib/dlib/march08/marshall/03marshall-pt1.html</ext-link></element-citation></ref>
<ref id="R33"><element-citation publication-type="web"><collab>Ministry of Education of the People&#x2019;s Republic of China</collab><year>2020</year><source>Notice of the Ministry of Education on the announcement of the results of the filing and approval of undergraduate majors in ordinary institutions of higher education for the year 2019</source><comment>MOE [2020] No. 2</comment><ext-link ext-link-type="uri" xlink:href="http://www.moe.gov.cn/srcsite/A08/moe_1034/s4930/202003/t20200303_426853.html">http://www.moe.gov.cn/srcsite/A08/moe_1034/s4930/202003/t20200303_426853.html</ext-link></element-citation></ref>
<ref id="R34"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Morse</surname><given-names>J. M.</given-names></name></person-group><year>1995</year><article-title>The significance of saturation</article-title><source>Qualitative Health Research</source><volume>5</volume><issue>2</issue><fpage>147</fpage><lpage>149</lpage><ext-link ext-link-type="uri" xlink:href="https://journals.sagepub.com/doi/10.1177/104973239500500201">https://journals.sagepub.com/doi/10.1177/104973239500500201</ext-link></element-citation></ref>
<ref id="R35"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Sinn</surname><given-names>D.</given-names></name><name><surname>Kim</surname><given-names>S.</given-names></name><name><surname>Syn</surname><given-names>S. Y.</given-names></name></person-group><year>2019</year><article-title>Information activities within information horizons: a case for college students&#x0027; personal information management</article-title><source>Library &#x0026; Information Science Research</source><volume>41</volume><issue>1</issue><fpage>19</fpage><lpage>30</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.lisr.2019.02.003">https://doi.org/10.1016/j.lisr.2019.02.003</ext-link></element-citation></ref>
<ref id="R36"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Song</surname><given-names>C.</given-names></name><name><surname>Park</surname><given-names>S.</given-names></name><name><surname>Kim</surname><given-names>D.</given-names></name><name><surname>Kang</surname><given-names>S.</given-names></name></person-group><year>2011</year><chapter-title>Parity cloud service: a privacy-protected personal data recovery service</chapter-title><source>10th International Conference on Trust, Security and Privacy in Computing and Communications</source><publisher-name>IEEE</publisher-name><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/TrustCom.2011.107">https://doi.org/10.1109/TrustCom.2011.107</ext-link></element-citation></ref>
<ref id="R37"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Tiroleans</surname><given-names>S.</given-names></name><name><surname>Signer</surname><given-names>B.</given-names></name></person-group><year>2014</year><chapter-title>Towards a conceptual framework and meta model for contextaware personal cross-media information management systems</chapter-title><source>Proceedings of the 33rd International Conference on Conceptual Modelling</source><publisher-name>Springer International Publishing</publisher-name><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-319-12206-9_26">https://doi.org/10.1007/978-3-319-12206-9_26</ext-link></element-citation></ref>
<ref id="R38"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Van Kreek</surname><given-names>M.</given-names></name><name><surname>Smith</surname><given-names>D. A.</given-names></name><name><surname>Shadbolt</surname><given-names>N. R.</given-names></name><name><surname>Schraefel</surname><given-names>M.</given-names></name></person-group><year>2012</year><chapter-title>A decentralised architecture for consolidating personal information ecosystems: the WebBox</chapter-title><source>5th Workshop on Personal Information Management</source><publisher-name>ACM</publisher-name><ext-link ext-link-type="uri" xlink:href="http://eprints.soton.ac.uk/id/eprint/273200">http://eprints.soton.ac.uk/id/eprint/273200</ext-link></element-citation></ref>
<ref id="R39"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname><given-names>C.</given-names></name><name><surname>Dong</surname><given-names>Y.</given-names></name><name><surname>Xu</surname><given-names>L.</given-names></name></person-group><year>2008</year><article-title>A storage solution for mobile personal information management system</article-title><source>Computer and Modernization</source><issue>8</issue><fpage>4</fpage><lpage>8</lpage><ext-link ext-link-type="uri" xlink:href="http://www.c-a-m.org.cn/CN/1006-2475/home.shtml">http://www.c-a-m.org.cn/CN/1006-2475/home.shtml</ext-link></element-citation></ref>
<ref id="R40"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Warraich</surname><given-names>N. F.</given-names></name><name><surname>Ali</surname><given-names>I.</given-names></name><name><surname>Yasmeen</surname><given-names>S.</given-names></name></person-group><year>2018</year><article-title>Keeping found things found: challenges and usefulness of personal information management among academicians</article-title><source>Information and Learning Science</source><volume>119</volume><issue>12</issue><fpage>712</fpage><lpage>720</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/ILS-07-2018-0064">https://doi.org/10.1108/ILS-07-2018-0064</ext-link></element-citation></ref>
<ref id="R41"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Weippl</surname><given-names>E. R.</given-names></name><name><surname>Klemen</surname><given-names>M.</given-names></name><name><surname>Fenz</surname><given-names>S.</given-names></name><name><surname>Ekelhart</surname><given-names>A.</given-names></name><name><surname>Tjoa</surname><given-names>A. M.</given-names></name></person-group><year>2007</year><chapter-title>The semantic desktop: a semantic personal information management system based on RDF and topic maps</chapter-title><source>Workshop on Ontologies-based Techniques for Databases and Information Systems</source><publisher-name>Springer Berlin Heidelberg</publisher-name><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-540-75474-9_9">https://doi.org/10.1007/978-3-540-75474-9_9</ext-link></element-citation></ref>
<ref id="R42"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Whittaker</surname><given-names>S.</given-names></name><name><surname>Bellotti</surname><given-names>V.</given-names></name><name><surname>Gwizdka</surname><given-names>J.</given-names></name></person-group><year>2006</year><article-title>Email in personal information management</article-title><source>Communications of the ACM</source><volume>49</volume><issue>1</issue><fpage>68</fpage><lpage>73</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/1107458.1107494">https://doi.org/10.1145/1107458.1107494</ext-link></element-citation></ref>
<ref id="R43"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Xian</surname><given-names>Y.</given-names></name></person-group><year>2022</year><article-title>Research and simulation of personal file data privacy disclosure under data sharing mode</article-title><source>Electronic Design Engineering</source><volume>30</volume><issue>19</issue><fpage>55</fpage><lpage>59</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.14022/j.issn1674-6236.2022.19.012">https://doi.org/10.14022/j.issn1674-6236.2022.19.012</ext-link></element-citation></ref>
<ref id="R44"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname><given-names>M.</given-names></name></person-group><year>2018</year><article-title>Guidelines on family documentation in Guangdong Province launched</article-title><source>China Archives</source><issue>10</issue><fpage>86</fpage></element-citation></ref>
<ref id="R45"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Yeo</surname><given-names>H. I.</given-names></name><name><surname>Lee</surname><given-names>Y. L.</given-names></name></person-group><year>2014</year><article-title>Exploring new potentials of blogs for learning: can children use blogs for personal information management (PIM)?</article-title><source>British Journal of Educational Technology</source><volume>45</volume><issue>5</issue><fpage>916</fpage><lpage>925</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1111/bjet.12117">https://doi.org/10.1111/bjet.12117</ext-link></element-citation></ref>
<ref id="R46"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhan</surname><given-names>N.</given-names></name></person-group><year>2018</year><article-title>Research on personal academic information management tool for scientific researchers</article-title><source>Library and Information Service</source><volume>62</volume><issue>21</issue><fpage>71</fpage><lpage>79</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.13266/j.issn.0252-3116.2018.21.009">https://doi.org/10.13266/j.issn.0252-3116.2018.21.009</ext-link></element-citation></ref>
<ref id="R47"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhao</surname><given-names>X.</given-names></name><name><surname>Li</surname><given-names>Y.</given-names></name><name><surname>Liu</surname><given-names>J.</given-names></name></person-group><year>2014</year><article-title>Searching personal files based on synonym relationship</article-title><source>Journal of Chinese Computer Systems</source><volume>35</volume><issue>9</issue><fpage>1971</fpage><lpage>1976</lpage><ext-link ext-link-type="uri" xlink:href="http://xwxt.sict.ac.cn/CN/Y2014/V35/I9/1971">http://xwxt.sict.ac.cn/CN/Y2014/V35/I9/1971</ext-link></element-citation></ref>
<ref id="R48"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhao</surname><given-names>Y.</given-names></name><name><surname>Duan</surname><given-names>X. E.</given-names></name><name><surname>Yang</surname><given-names>H.</given-names></name></person-group><year>2019</year><article-title>Postgraduates&#x0027; personal digital archiving practices in China: problems and strategies</article-title><source>Journal of Academic Librarianship</source><volume>45</volume><issue>5</issue><fpage>102044</fpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.acalib.2019.06.002">https://doi.org/10.1016/j.acalib.2019.06.002</ext-link></element-citation></ref>
<ref id="R49"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zheng</surname><given-names>L.</given-names></name><name><surname>Zhao</surname><given-names>J.</given-names></name><name><surname>Xu</surname><given-names>Y.</given-names></name></person-group><year>2018</year><article-title>Personal information management system based on blockchain technology</article-title><source>Internet of Things Technologies</source><volume>8</volume><issue>9</issue><fpage>100</fpage><lpage>101</lpage><fpage>103</fpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.16667/j.issn.2095-1302.2018.09.025">https://doi.org/10.16667/j.issn.2095-1302.2018.09.025</ext-link></element-citation></ref>
<ref id="R50"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhou</surname><given-names>B.</given-names></name><name><surname>Zhong</surname><given-names>S.</given-names></name></person-group><year>2010</year><article-title>Research and implementation of information tagging in personal dataspaces</article-title><source>Computer Engineering &#x0026; Science</source><volume>31</volume><issue>1</issue><fpage>92</fpage><lpage>96</lpage><comment>108</comment><ext-link ext-link-type="uri" xlink:href="http://joces.nudt.edu.cn/CN/Y2010/V32/I1/92">http://joces.nudt.edu.cn/CN/Y2010/V32/I1/92</ext-link></element-citation></ref>
<ref id="R51"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhou</surname><given-names>L.</given-names></name><name><surname>Zhang</surname><given-names>D.</given-names></name><name><surname>Yang</surname><given-names>C. C.</given-names></name><name><surname>Wang</surname><given-names>Y.</given-names></name></person-group><year>2018</year><article-title>Harnessing social media for health information management</article-title><source>Electronic Commerce Research and Applications</source><issue>27</issue><fpage>139</fpage><lpage>151</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.elerap.2017.12.003">https://doi.org/10.1016/j.elerap.2017.12.003</ext-link></element-citation></ref>
<ref id="R52"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Zichichi</surname><given-names>M.</given-names></name><name><surname>Ferretti</surname><given-names>S.</given-names></name><name><surname>D&#x0027;Angelo</surname><given-names>G.</given-names></name></person-group><year>2020</year><chapter-title>On the efficiency of decentralised file storage for personal information management systems</chapter-title><source>The 25th IEEE Symposium on Computers and Communications</source><publisher-name>IEEE</publisher-name><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ISCC50000.2020.9219623">https://doi.org/10.1109/ISCC50000.2020.9219623</ext-link></element-citation></ref>
</ref-list>
</back>
</article>