首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The paper delineates and explains an emerging, but significant, form of digital information seeking behaviour among information consumers, which the authors have called ‘bouncing’. The evidence for this behaviour has emerged from five years of deep log analysis studies – an advanced form of transaction log analysis – of a wide range of users of digital information resources. Much of the evidence and discussion provided comes from the scholarly communication field. Two main bouncing metrics were applied in the log studies: site penetration, which is the number of items or pages viewed in a session, and return visits. The evidence shows that (1) a high proportion of people view just a few items or pages during a visit to a site and, (2) a high proportion of visitors either do not come back to the site or they did so infrequently. Typically those who penetrated a site least tended to return the least frequently. These people are termed ‘bouncers’. They bounce into the site and then bounce out again, presumably, to another site, as a high proportion of them do not appear to come back again. Possible explanations – negative and positive, for the form of behaviour are discussed.  相似文献   

2.
Metrics derived from user visits or sessions provide a means of evaluating Websites and an important insight into online information seeking behaviour, the most important of them being the duration of sessions and the number of pages viewed in a session, a possible busyness indicator. However, the identification of session (termed often ‘sessionization’) is fraught with difficulty in that there is no way of determining from a transactional log file that a user has ended their session. No one logs out. Instead a session delimiter has to be applied and this is typically done on the basis of a standard period of inactivity. To date researchers have discussed the issue of a time out delimiter in terms of a single value and if a page view time exceeds the cut-off value the session is deemed to have ended. This approach assumes that page view time is a single distribution and that the cut-off value is one point on that distribution. The authors however argue that page time distribution is composed of a number of quite separate view time distributions because of the marked differences in view times between pages (abstract, contents page, full text). This implies that a number of timeout delimiters should be applied. Employing data from a study of the OhioLINK digital journal library, the authors demonstrate how the setting of a time out delimiter impacts on the estimate of page view time and the number of estimated session. Furthermore, they also show how a number of timeout delimiters might apply and they argue that this gives a better and more robust estimate of the number of sessions, session time and page view time compared to an application of a single timeout delimiter.  相似文献   

3.
We report a naturalistic interactive information retrieval (IIR) study of 18 ordinary users in the age of 20–25 who carry out everyday-life information seeking (ELIS) on the Internet with respect to the three types of information needs identified by Ingwersen (1986): the verificative information need (VIN), the conscious topical information need (CIN), and the muddled topical information need (MIN). The searches took place in the private homes of the users in order to ensure as realistic searching as possible. Ingwersen (1996) associates a given search behaviour to each of the three types of information needs, which are analytically deduced, but not yet empirically tested. Thus the objective of the study is to investigate whether empirical data does, or does not, conform to the predictions derived from the three types of information needs. The main conclusion is that the analytically deduced information search behaviour characteristics by Ingwersen are positively corroborated for this group of test participants who search the Internet as part of ELIS.  相似文献   

4.
The authors of this paper investigate terms of consumers’ diabetes based on a log from the Yahoo!Answers social question and answers (Q&A) forum, ascertain characteristics and relationships among terms related to diabetes from the consumers’ perspective, and reveal users’ diabetes information seeking patterns. In this study, the log analysis method, data coding method, and visualization multiple-dimensional scaling analysis method were used for analysis. The visual analyses were conducted at two levels: terms analysis within a category and category analysis among the categories in the schema. The findings show that the average number of words per question was 128.63, the average number of sentences per question was 8.23, the average number of words per response was 254.83, and the average number of sentences per response was 16.01. There were 12 categories (Cause & Pathophysiology, Sign & Symptom, Diagnosis & Test, Organ & Body Part, Complication & Related Disease, Medication, Treatment, Education & Info Resource, Affect, Social & Culture, Lifestyle, and Nutrient) in the diabetes related schema which emerged from the data coding analysis. The analyses at the two levels show that terms and categories were clustered and patterns were revealed. Future research directions are also included.  相似文献   

5.
6.
Recommender systems are techniques to make personalized recommendations of items to users. In e-commerce sites and online sharing communities, providing high quality recommendations is an important issue which can help the users to make effective decisions to select a set of items. Collaborative filtering is an important type of the recommender systems that produces user specific recommendations of the items based on the patterns of ratings or usage (e.g. purchases). However, the quality of predicted ratings and neighbor selection for the users are important problems in the recommender systems. Selecting suitable neighbors set for the users leads to improve the accuracy of ratings prediction in recommendation process. In this paper, a novel social recommendation method is proposed which is based on an adaptive neighbor selection mechanism. In the proposed method first of all, initial neighbors set of the users is calculated using clustering algorithm. In this step, the combination of historical ratings and social information between the users are used to form initial neighbors set for the users. Then, these neighbor sets are used to predict initial ratings of the unseen items. Moreover, the quality of the initial predicted ratings is evaluated using a reliability measure which is based on the historical ratings and social information between the users. Then, a confidence model is proposed to remove useless users from the initial neighbors of the users and form a new adapted neighbors set for the users. Finally, new ratings of the unseen items are predicted using the new adapted neighbors set of the users and the top_N interested items are recommended to the active user. Experimental results on three real-world datasets show that the proposed method significantly outperforms several state-of-the-art recommendation methods.  相似文献   

7.
Most social Q&A sites are designed to support solo searchers who access the aggregated opinions of other users, and ask and answer questions of their own. The purpose of this paper is to show how users in one social Q&A community defy system constraints to engage in brief, informal episodes of collaborative information seeking called microcollaborations. A brief literature review is presented, suggesting a view of information seeking as a combination of problem-centered information seeking, technological affordances and constraints, and social and affective factors. The results of content and transaction log analyses of user interactions suggest that topics of collaboration share a common threshold of complexity and invite responses containing both fact and opinion. Analysis also revealed that key elements in predicting a collaborative instance involve social capital and affective factors unrelated to the topic of the collaboration. Suggestions for supporting future lightweight microcollaborations, and implications for future research, are discussed.  相似文献   

8.
Recommender Systems are currently highly relevant for helping users deal with the information overload they suffer from the large volume of data on the web, and automatically suggest the most appropriate items that meet users needs. However, in cases in which a user is new to Recommender System, the system cannot recommend items that are relevant to her/him because of lack of previous information about the user and/or the user-item rating history that helps to determine the users preferences. This problem is known as cold-start, which remains open because it does not have a final solution. Social networks have been employed as a good source of information to determine users preferences to mitigate the cold-start problem. This paper presents the results of a Systematic Literature Review on Collaborative Filtering-based Recommender System that uses social network data to mitigate the cold-start problem. This Systematic Literature Review compiled the papers published between 2011–2017, to select the most recent studies in the area. Each selected paper was evaluated and classified according to the depth which social networks used to mitigate the cold-start problem. The final results show that there are several publications that use the information of the social networks within the Recommender System; however, few research papers currently use this data to mitigate the cold-start problem.  相似文献   

9.
This research focuses specifically on uncertainty and information seeking in a digital environment. In this research we argue that different types of uncertainty are associated with the information seeking process and that, with the proliferation of new and different search tools, sources and channels, uncertainty, positive/desirable or negative/undesirable, continues to be a significant factor in the search process. Users may feel uncertain at any stage of the information search and retrieval process and uncertainty may remain even after completion of the process resulting in what may be called persistent uncertainty. An online questionnaire was used to collect data from users in the higher education sector. There were three parts to the questionnaire focusing on: information seeking activities, information seeking problems, and access to specific information channels or sources. Quantitative analysis was carried out on the data collected through the online questionnaire. A total of 668 responses were returned from the chosen user categories of academic staff, research staff and research students. This research has shown that there are some information seeking activities and information seeking problems that are the most common causes of uncertainty among significant number of users from different disciplines, age, gender, ICT skills, etc. This is also the case with respect to access to and use of specific information sources/channels, although the degrees of uncertainty in relation are relatively small. Possible implications of this study and further research issues are indicated.  相似文献   

10.
The concept of an “information space” provides a powerful metaphor for guiding the design of interactive retrieval systems. We present a case study of related article search, a browsing tool designed to help users navigate the information space defined by results of the PubMed® search engine. This feature leverages content-similarity links that tie MEDLINE® citations together in a vast document network. We examine the effectiveness of related article search from two perspectives: a topological analysis of networks generated from information needs represented in the TREC 2005 genomics track and a query log analysis of real PubMed users. Together, data suggest that related article search is a useful feature and that browsing related articles has become an integral part of how users interact with PubMed.  相似文献   

11.
Real time search is an increasingly important area of information seeking on the Web. In this research, we analyze 1,005,296 user interactions with a real time search engine over a 190 day period. Using query log analysis, we investigate searching behavior, categorize search topics, and measure the economic value of this real time search stream. We examine aggregate usage of the search engine, including number of users, queries, and terms. We then classify queries into subject categories using the Google Directory topical hierarchy. We next estimate the economic value of the real time search traffic using the Google AdWords keyword advertising platform. Results shows that 30% of the queries were unique (used only once in the entire dataset), which is low compared to traditional Web searching. Also, 60% of the search traffic comes from the search engine’s application program interface, indicating that real time search is heavily leveraged by other applications. There are many repeated queries over time via these application program interfaces, perhaps indicating both long term interest in a topic and the polling nature of real time queries. Concerning search topics, the most used terms dealt with technology, entertainment, and politics, reflecting both the temporal nature of the queries and, perhaps, an early adopter user-based. However, 36% of the queries indicate some geographical affinity, pointing to a location-based aspect to real time search. In terms of economic value, we calculate this real time search stream to be worth approximately US $33,000,000 (US $33 M) on the online advertising market at the time of the study. We discuss the implications for search engines and content providers as real time content increasingly enters the main stream as an information source.  相似文献   

12.
13.
The evaluation of exploratory search relies on the ongoing paradigm shift from focusing on the search algorithm to focusing on the interactive process. This paper proposes a model-driven formative evaluation approach, in which the goal is not the evaluation of a specific system, per se, but the exploration of new design possibilities. This paper gives an example of this approach where a model of sensemaking was used to inform the evaluation of a basic exploratory search system(s) in the context of a sensemaking task. The model suggested that, rather than just looking at simple search performance measures, we should examine closely the interwoven, interactive processes of both representation construction and information seeking. Participants were asked to make sense of an unfamiliar topic using an augmented query-based search system. The processes of representation construction and information seeking were captured and analyzed using data from experiment notes, interviews, and a system log. The data analysis revealed users’ sources of ideas for structuring representations and a tightly coupled relationship between search and representation construction in their exploratory searches. For example, users strategically used search to find useful structure ideas instead of just accumulating information facts. Implications for improving current search systems and designing new systems are discussed.  相似文献   

14.
We generated networks of journal relationships from citation and download data, and determined journal impact rankings from these networks using a set of social network centrality metrics. The resulting journal impact rankings were compared to the ISI IF. Results indicate that, although social network metrics and ISI IF rankings deviate moderately for citation-based journal networks, they differ considerably for journal networks derived from download data. We believe the results represent a unique aspect of general journal impact that is not captured by the ISI IF. These results furthermore raise questions regarding the validity of the ISI IF as the sole assessment of journal impact, and suggest the possibility of devising impact metrics based on usage information in general.  相似文献   

15.
This paper reviews a number of models of information behaviour and introduces a model based on the goal-directed behaviour of problem solving. A key part of the problem-solving process is held to be that of ‘uncertainty reduction’ and this aspect of the information seeking and searching process is currently being explored in a project supported by the British Library Research and Innovation Centre. Preliminary results from the pilot phase of the Project are presented which suggest possible lines of further investigation.  相似文献   

16.
[目的/意义]作为健康信息的一种,在线医评信息对用户医疗决策十分重要。研究用户查寻在线医评信息的过程,挖掘存在的障碍,有助于优化医评网站设计、促进医生在线服务和满足用户健康信息查寻需求。[方法/过程]采用检索实验、内容分析、发声思考和问卷调查等方法,从查寻表现、查寻阶段和查寻障碍3个方面分析在线医评信息这一特定情景下用户的查寻行为及存在问题。[结果/结论]结果显示教育水平和健康信息检索技能与在线医评信息查寻表现正向相关。在线医评信息查寻过程模型包括医生初筛、医评信息检索、浏览、对比、验证和利用6个阶段。健康信息检索技能和甄别能力弱、医评网站评论数量少、医院官网和医评网站可用性差以及医评网站与线下医疗服务融合程度低是影响用户查寻在线医评信息的主要障碍。  相似文献   

17.
针对目前用户对电子政务个性化信息服务的迫切需求,为了更好地服务用户,本文将数据挖掘中的关联规则分析方法应用于电子政务个性化信息服务中,运用Apriori算法对用户日志文件进行分析,得出了用户访问页面之间的关联规则,为电子政务个性化信息推送提供有力的数据支持。  相似文献   

18.
Toward a Typology of Internet Users and Online Privacy Concerns   总被引:2,自引:0,他引:2  
Traditional typologies of consumer privacy concern suggest that consumers fall into three distinct groups: One-fourth of consumers are not concerned about privacy, one-fourth are highly concerned, and half are pragmatic, in that their concerns about privacy depend on the situation presented. This study examines online users to determine whether types of privacy concern online mirror the offline environment. An e-mail survey of online users examined perceived privacy concerns of 15 different situations involving collection and usage of personally identifiable information. Results indicate that the vast majority of online users are pragmatic when it comes to privacy. Further analysis of the data suggested that online users can be segmented into four distinct groups, representing differing levels of privacy concern. Distinct demographic differences were seen. Persons with higher levels of education are more concerned about their privacy online than persons with less education. Additionally, persons over the age of 45 years tended to be either not at all concerned about privacy or highly concerned about privacy. Younger persons tended to be more pragmatic. Content and policy implications are provided.  相似文献   

19.
The current awareness [or selective dissemination of information (SDI)] services of AT&T Bell Laboratories are described. Several bulletins announcing over 80,000 externally published items/year are issued at regular intervals and sent to about 6100 subscribers. Production is done by the BELLPAR (Bell Laboratories Publication, Alerting, and Retrieval) system, which processes four commercial machine-readable databases and prepares camera-ready bulletin copy. A photocopy service processing some 10,000 requests/month provides document delivery for items announced in the bulletins. Subscribers may order photocopies electronically if they wish. A “captive” journal collection supports the copying operation; non-journal articles, such as conference proceedings and technical reports, are ordered from external suppliers. Improvements in the SDI service include electronic bulletins, more focused bulletins and additional databases as input.  相似文献   

20.
Many computer users are happy to be oblivious of the workings within the machine and yet on some level it is important to know what is occurring therein. This paper discusses an unusual type of surveillance software which may be installed in many computers. The strange aspect of this software is that it has often been downloaded and installed by the user, but without her knowledge. The software is mainly designed to collect information about the user of the computer and relay this information back to the software manufacturer. The download, installation, data collection and data transfer all take place within the users own computer but very seldom with the users knowledge. It is the intention of this paper to describe the technology involved and thereafter discuss how this new technology is affecting the online privacy debate. The paper continues to discuss the basis for legitimacy of technology and also the current level of technological deterrents available. The paper concludes with a comparison of two approaches at resolving the current problem, via legislation or the market approach.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号