Home About us Contact | |||
Web Users (web + user)
Selected AbstractsRational Analyses of Information Foraging on the WebCOGNITIVE SCIENCE - A MULTIDISCIPLINARY JOURNAL, Issue 3 2005Peter Pirolli Abstract This article describes rational analyses and cognitive models of Web users developed within information foraging theory. This is done by following the rational analysis methodology of (a) characterizing the problems posed by the environment, (b) developing rational analyses of behavioral solutions to those problems, and (c) developing cognitive models that approach the realization of those solutions. Navigation choice is modeled as a random utility model that uses spreading activation mechanisms that link proximal cues (information scent) that occur in Web browsers to internal user goals. Web-site leaving is modeled as an ongoing assessment by the Web user of the expected benefits of continuing at a Web site as opposed to going elsewhere. These cost,benefit assessments are also based on spreading activation models of information scent. Evaluations include a computational model of Web user behavior called Scent-Based Navigation and Information Foraging in the ACT Architecture, and the Law of Surfing, which characterizes the empirical distribution of the length of paths of visitors at a Web site. [source] Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS)JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, Issue 2 2010Yuval Elovici Terrorist groups use the Web as their infrastructure for various purposes. One example is the forming of new local cells that may later become active and perform acts of terror. The Advanced Terrorist Detection System (ATDS), is aimed at tracking down online access to abnormal content, which may include terrorist-generated sites, by analyzing the content of information accessed by the Web users. ATDS operates in two modes: the training mode and the detection mode. In the training mode, ATDS determines the typical interests of a prespecified group of users by processing the Web pages accessed by these users over time. In the detection mode, ATDS performs real-time monitoring of the Web traffic generated by the monitored group, analyzes the content of the accessed Web pages, and issues an alarm if the accessed information is not within the typical interests of that group and similar to the terrorist interests. An experimental version of ATDS was implemented and evaluated in a local network environment. The results suggest that when optimally tuned the system can reach high detection rates of up to 100% in case of continuous access to a series of terrorist Web pages. [source] Analysis of the query logs of a Web site search engineJOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, Issue 13 2005Michael Chau A large number of studies have investigated the transaction log of general-purpose search engines such as Excite and AltaVista, but few studies have reported on the analysis of search logs for search engines that are limited to particular Web sites, namely, Web site search engines. In this article, we report our research on analyzing the search logs of the search engine of the Utah state government Web site. Our results show that some statistics, such as the number of search terms per query, of Web users are the same for general-purpose search engines and Web site search engines, but others, such as the search topics and the terms used, are considerably different. Possible reasons for the differences include the focused domain of Web site search engines and users' different information needs. The findings are useful for Web site developers to improve the performance of their services provided on the Web and for researchers to conduct further research in this area. The analysis also can be applied in e-government research by investigating how information should be delivered to users in government Web sites. [source] Design criteria for children's Web portals: The users speak outJOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, Issue 2 2002Andrew Large Four focus groups were held with young Web users (10 to 13 years of age) to explore design criteria for Web portals. The focus group participants commented upon four existing portals designed with young users in mind: Ask Jeeves for Kids, KidsClick, Lycos Zone, and Yahooligans! This article reports their first impressions on using these portals, their likes and dislikes, and their suggestions for improvements. Design criteria for children's Web portals are elaborated based upon these comments under four headings: portal goals, visual design, information architecture, and personalization. An ideal portal should cater for both educational and entertainment needs, use attractive screen designs based especially on effective use of color, graphics, and animation, provide both keyword search facilities and browsable subject categories, and allow individual user personalization in areas such as color and graphics. [source] Public library websites for teenagers: How are they addressing the consumer health information needs of today's teens?PROCEEDINGS OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE & TECHNOLOGY (ELECTRONIC), Issue 1 2007Jennifer E. Burke Young adult use of the Web both for creating and reviewing content continues to grow and the Internet has become an important tool for teenagers seeking health information (Borzekowski & Rickert 2001, Gray et al 2005; Rideout 2001; Richardson 2002; Vargas 2005). More than 70 percent of 15 to 17 year olds say they have used the Internet to look up health information (Rideout 2001, Richardson et al 2002). In fact, the Kaiser Family Foundation study reported in "Generation Rx.com" found that more youth had looked for health information than had engaged in various Web 2.0 behaviors as purchasing something online or using a chat room (Rideout 2001). Researchers cite availability, anonymity, and affordability as the key reasons teenagers turn to the web for answers to their health-related questions (Barak & Fisher 2001; Gray et al 2005). While the Internet provides teenagers with access to a wealth of health-related resources, it also presents challenges that can negatively impact the ability of adolescents to access quality information online. Difficulty conducting searches, judging the credibility of the information retrieved, and accessing sites due to filtering software are just a few of the barriers teenagers face (Gray et al 2002; Gray et al 2005; Richardson et al 2002). Like many Web users, teenagers also express concerns about privacy and confidentiality, especially in chat rooms or email correspondences (Vargas 2005). Given the issues teens face when searching for health information online, it seems natural that public libraries take the lead in providing assistance to teenagers who need help finding health information. Libraries, particularly public libraries, have a long history of providing consumer heath information to adults in their communities, and this service has transitioned online as libraries provide Internet access to electronic consumer health information (Smith 2006). In addition, many public libraries have developed websites specifically for teenagers. As more teens look for personalized information or the ability to ,create' their own content, these library web pages often serve as centers for reference, educational support, popular materials, community information, and library programming (Hughes-Hassell & Miller 2003; Jones 1997). Including links to useful websites would alleviate some of the frustration teenagers face when searching for quality health information on the Internet and allow them to make their own informed decisions (Vargas 2005). But how common is it for these web pages to provide consumer health information for teenagers? [source] Rational Analyses of Information Foraging on the WebCOGNITIVE SCIENCE - A MULTIDISCIPLINARY JOURNAL, Issue 3 2005Peter Pirolli Abstract This article describes rational analyses and cognitive models of Web users developed within information foraging theory. This is done by following the rational analysis methodology of (a) characterizing the problems posed by the environment, (b) developing rational analyses of behavioral solutions to those problems, and (c) developing cognitive models that approach the realization of those solutions. Navigation choice is modeled as a random utility model that uses spreading activation mechanisms that link proximal cues (information scent) that occur in Web browsers to internal user goals. Web-site leaving is modeled as an ongoing assessment by the Web user of the expected benefits of continuing at a Web site as opposed to going elsewhere. These cost,benefit assessments are also based on spreading activation models of information scent. Evaluations include a computational model of Web user behavior called Scent-Based Navigation and Information Foraging in the ACT Architecture, and the Law of Surfing, which characterizes the empirical distribution of the length of paths of visitors at a Web site. [source] Subject categorization of query terms for exploring Web users' search interestsJOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, Issue 8 2002Hsiao-Tieh Pu Subject content analysis of Web query terms is essential to understand Web searching interests. Such analysis includes exploring search topics and observing changes in their frequency distributions with time. To provide a basis for in-depth analysis of users' search interests on a larger scale, this article presents a query categorization approach to automatically classifying Web query terms into broad subject categories. Because a query is short in length and simple in structure, its intended subject(s) of search is difficult to judge. Our approach, therefore, combines the search processes of real-world search engines to obtain highly ranked Web documents based on each unknown query term. These documents are used to extract cooccurring terms and to create a feature set. An effective ranking function has also been developed to find the most appropriate categories. Three search engine logs in Taiwan were collected and tested. They contained over 5 million queries from different periods of time. The achieved performance is quite encouraging compared with that of human categorization. The experimental results demonstrate that the approach is efficient in dealing with large numbers of queries and adaptable to the dynamic Web environment. Through good integration of human and machine efforts, the frequency distributions of subject categories in response to changes in users' search interests can be systematically observed in real time. The approach has also shown potential for use in various information retrieval applications, and provides a basis for further Web searching studies. [source] A longitudinal study of World Wide Web users' information-searching behaviorJOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, Issue 2 2002Vivian Cothey A study of the "real world" Web information searching behavior of 206 college students over a 10-month period showed that, contrary to expectations, the users adopted a more passive or browsing approach to Web information searching and became more eclectic in their selection of Web hosts as they gained experience. The study used a longitudinal transaction log analysis of the URLs accessed during 5,431 user days of Web information searching to detect changes in information searching behavior associated with increased experience of using the Web. The findings have implications for the design of future Web information retrieval tools. [source] Understanding and reducing web delaysINTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, Issue 2 2005Kevin Curran Over the years the number of web users has increased dramatically unfortunately leading to the inherent problem of congestion. This can affect each user's surfing experience. This paper investigates download times associated with a web request, identifies where delays occur, and provides guidelines which can be followed by web developers to enable a faster and more efficient download and service for their users.,Copyright © 2005 John Wiley & Sons, Ltd. [source] |