2018
DOI: 10.6017/ital.v37i4.10702
|View full text |Cite
|
Sign up to set email alerts
|

The “Black Box”: How Students Use a Single Search Box to Search for Music Materials

Abstract: Given the inherent challenges music materials present to systems and searchers (formats, title forms and languages, and the presence of additional metadata such as work numbers and keys), it is reasonable that those searching for music develop distinctive search habits compared to patrons in other subject areas. This study uses transaction log analysis of the music and performing arts module of a library’s federated discovery tool to determine how patrons search for music materials. It also makes a top-level c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 19 publications
(20 reference statements)
0
1
0
Order By: Relevance
“…It is particularly urgent and prominent in the field of ecommerce. If the recommendation system of University Library is to provide intelligent services, it is necessary to obtain various kinds of information from users, including sensitive information, to analyze users' behavior and needs and to establish user models, in order to produce intelligent recommendation services (Biasutti and Concina, 2018;Cejka et al, 2018;Dougan, 2018). Especially with the deepening of intelligent recommendation, the system tends to overemphasize the access to personal information of users, while ignoring the protection and control of personal information data by users themselves.…”
Section: Discussionmentioning
confidence: 99%
“…It is particularly urgent and prominent in the field of ecommerce. If the recommendation system of University Library is to provide intelligent services, it is necessary to obtain various kinds of information from users, including sensitive information, to analyze users' behavior and needs and to establish user models, in order to produce intelligent recommendation services (Biasutti and Concina, 2018;Cejka et al, 2018;Dougan, 2018). Especially with the deepening of intelligent recommendation, the system tends to overemphasize the access to personal information of users, while ignoring the protection and control of personal information data by users themselves.…”
Section: Discussionmentioning
confidence: 99%