1980
DOI: 10.1016/0306-4573(80)90003-5
|View full text |Cite
|
Sign up to set email alerts
|

Monitoring and evaluation of on-line information system usage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

1986
1986
2006
2006

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 38 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…Online monitoring, also known as transaction log analysis, is a proven technique for evaluating searching behavior and complements other methods such as interviews and visual observations (Borgman, Hirsh, & Hiller, 1996). It also is considered to be a powerful and flexible technique for data collection to analyze user interactions with an IR system and to evaluate IR interfaces (Penniman & Dominick, 1980). Within this study, Lotus ScreenCam, a commercial screen-capturing software package produced by IBM Software Group, was utilized.…”
Section: Data-gathering Toolsmentioning
confidence: 99%
“…Online monitoring, also known as transaction log analysis, is a proven technique for evaluating searching behavior and complements other methods such as interviews and visual observations (Borgman, Hirsh, & Hiller, 1996). It also is considered to be a powerful and flexible technique for data collection to analyze user interactions with an IR system and to evaluate IR interfaces (Penniman & Dominick, 1980). Within this study, Lotus ScreenCam, a commercial screen-capturing software package produced by IBM Software Group, was utilized.…”
Section: Data-gathering Toolsmentioning
confidence: 99%
“…To ensure user privacy, identifiable user codes were recoded to produce consistent but anonymous individual user codes (Penniman & Dominick, 1980). A key concept embodied within the transaction monitoring technique is that of an information-searching session (He & Göker, 2000), that is, a demarcating of the collection of transaction records so that together they constitute (for a particular user) a self-contained episode of information searching (Borgman, Hirsh, & Hiller, 1996;Peters, 1993).…”
Section: Data Collectionmentioning
confidence: 99%
“…Moreover, strategies are inherently temporal and variable in length, making coding and analysis difficult. Although analysis of user states and transitions has been used to assess tactics and determine strategies [20,25], new methods of analyzing such data are needed. In the meantime, it seems prudent to apply the incomparable pattern recognition capabilities of the human mind directly to the process of learning in order to make direct inferences about learning patterns.…”
Section: 9mentioning
confidence: 99%