1994
DOI: 10.1080/01449299408914595
|View full text |Cite
|
Sign up to set email alerts
|

Designing and using integrated data collection and analysis tools: challenges and considerations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
4
0

Year Published

1994
1994
2001
2001

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…For example, it is typical that session logs are somewhat indeterminate with respect to larger goals and motives that caused the session in the first place [20]. Many sources of information might have to be combined to reconstruct the causal chain of events that leads from placing a public access terminal in a library, or from providing dialup access to municipal databases, to an increase in public participation in an episode of political decision-making, and a specific impact on the decision outcome.…”
Section: Coordinate and Cross-leverage Evaluationmentioning
confidence: 99%
“…For example, it is typical that session logs are somewhat indeterminate with respect to larger goals and motives that caused the session in the first place [20]. Many sources of information might have to be combined to reconstruct the causal chain of events that leads from placing a public access terminal in a library, or from providing dialup access to municipal databases, to an increase in public participation in an episode of political decision-making, and a specific impact on the decision outcome.…”
Section: Coordinate and Cross-leverage Evaluationmentioning
confidence: 99%
“…These can be used to mark specific user actions, or sequences of actions, or to provide context information relating to the "state of the program" which can be essential for the successful interpretation of the data. keylogging methods can make data analysis a daunting task (Hoiem & Sullivan, 1994). However, a number of statistical techniques, based on the contingent probability of events, can be used to analyze sequential data ofthis type (Cuomo, 1994;Sanderson & Fisher, 1994).…”
Section: An Overview Of the Dataloggermentioning
confidence: 99%
“…First, it is possible that keystroke information can be logged by a human monitor. This process might be assisted by a video recording of user performance, the use of a separate computer running software designed to facilitate the recording ofmultiple events and timing intervals (Phillips & Dumas, 1990), or both (Hoiem & Sullivan, 1994). A commercially available example of software that can be used in this way is EVENTLOG (Hendersen, 1987).…”
mentioning
confidence: 99%
See 1 more Smart Citation