Search results
1 – 10 of 12Karen Markey Drabenstott and Diane Vizine‐Goetz
Search trees presented in this article control system responses and determine appropriate subject searching approaches to user queries. Users do not explicitly choose a particular…
Abstract
Search trees presented in this article control system responses and determine appropriate subject searching approaches to user queries. Users do not explicitly choose a particular approach. Rather, systems respond with an approach based on the extent to which queries match the catalog's controlled vocabulary and produce retrievals. The benefit of incorporating search trees into online bibliographic systems is the ability to place the responsibility of determining which approach produces the best results on the system.
Denise Kaplan, Joseph R. Matthews, William Horton, Karen Markey Drabenstott, Charles R. Hildreth, Katharina Klemperer, Lare Mischo, K.T. Noerr and Marilee Winiarski
Most second‐generation online catalogs give libraries some capability to customize help messages, screen displays, and system prompts. Microcomputer applications designed or…
Abstract
Most second‐generation online catalogs give libraries some capability to customize help messages, screen displays, and system prompts. Microcomputer applications designed or mounted locally may offer even more flexibility. Commercially available information systems offer the user some type of assistance, even when not totally profitable. The librarian has become an active, if not always willing, participant in the design of his or her system's user interface. Knowledge of both patrons and collections can have direct bearing on the structure and effectiveness of the library's automated system, its interface, and online help features.
Karen M. Drabenstott and Marjorie S. Weller
Library users continue to experience difficulty in using the online catalog, particularly in the area of subject access. This project describes a test of a new design for subject…
Abstract
Library users continue to experience difficulty in using the online catalog, particularly in the area of subject access. This project describes a test of a new design for subject access to online catalogs. The new design requires a wide range of subject searching capabilities and search trees to govern the system's selection of searching capabilities in response to user queries. Is the performance of search trees superior to subject searching approaches chosen at random? This project is geared to make that determination.
The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a…
Abstract
The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a literature review of the first twenty‐five years of TLA poses some challenges and requires some decisions. The primary organizing principle could be a strict chronology of the published research, the research questions addressed, the automated information retrieval (IR) systems that generated the data, the results gained, or even the researchers themselves. The group of active transaction log analyzers remains fairly small in number, and researchers who use transaction logs tend to use this method more than once, so tracing the development and refinement of individuals' uses of the methodology could provide insight into the progress of the method as a whole. For example, if we examine how researchers like W. David Penniman, John Tolle, Christine Borgman, Ray Larson, and Micheline Hancock‐Beaulieu have modified their own understandings and applications of the method over time, we may get an accurate sense of the development of all applications.
Introduction Since the earliest transaction monitoring studies, researchers have encountered the boundaries that define transaction log analysis as a methodology for studying the…
Abstract
Introduction Since the earliest transaction monitoring studies, researchers have encountered the boundaries that define transaction log analysis as a methodology for studying the use of online information retrieval systems. Because, among other reasons, transaction log databases contain relatively few fields and lack sufficient retrieval tools, students of transaction log data have begun to ask as many questions about what transaction logs cannot reveal as they have asked about what transaction logs can reveal. Researchers have conducted transaction monitoring studies to understand the objective phenomena embodied in this statement: “Library patrons enter searches into online information retrieval systems.” Transaction log data effectively describe what searches patrons enter and when they enter them, but they don't reflect, except through inference, who enters the searches, why they enter them, and how satisfied they are with their results.
With the continuing increases in computer processing and storage capabilities, the barriers to and benefits of electronic access to more information content are becoming serious…
Abstract
With the continuing increases in computer processing and storage capabilities, the barriers to and benefits of electronic access to more information content are becoming serious issues in information science research. The experiments described in this article, which address the value of content‐enriched access, are important to continued progress in information retrieval. Well‐selected content components and full‐text materials in electronic systems must be linked with improved search methodologies, better computer interfaces, and greater understanding of the structure and use of knowledge. Content‐enriched records, augmented by these other developments, will enhance the probability of users identifying the information they require.
The ability to conduct unobtrusive observation of user searching is a potential strength of the method of information retrieval system analysis known as transaction log analysis…
Abstract
The ability to conduct unobtrusive observation of user searching is a potential strength of the method of information retrieval system analysis known as transaction log analysis (TLA). Transaction logs supply unequivocal information about what a user typed while searching. All other methods rely on self‐reporting, which, as Nielsen points out, is not always corroborated by the logs. Regardless of where in an institution information retrieval (IR) system evaluation takes place, TLA is a method that enables library staff at all levels to examine a variety of system and user‐related activities that are recorded on the log. Dominick suggested that TLA can enable the examination of three broad categories of activity: 1) system performance and resource utilization, 2) information retrieval performance, and 3) user interaction with the IR system. This article has been divided into several sections corresponding to functional areas in a library to suggest useful applications of TLA.
Reports on the OCLC Users’ Council meeting of February 5‐7, 1996. Issues discussed included nominations for the board of trustees, the OCLC president’s report, the Users’ Council…
Abstract
Reports on the OCLC Users’ Council meeting of February 5‐7, 1996. Issues discussed included nominations for the board of trustees, the OCLC president’s report, the Users’ Council executive committee report and reports on users of electronic information. Also under discussion were a number of strategies for the future.
Introduction The central goal of transaction log analysis is to acquire new knowledge, which will help library managers, systems designers/developers, and researchers better…
Abstract
Introduction The central goal of transaction log analysis is to acquire new knowledge, which will help library managers, systems designers/developers, and researchers better understand how online information systems are used by library patrons and staffs. This knowledge can then be used to improve library services and operations through better designed systems and better allocation (or reallocation) of library resources. An example of reallocation of resources is changing schedules of public service staff to more closely match when and where patrons need help (e.g., in nonfiction, on weekends) and the relocation of terminals to where they are needed the most (e.g., to the science reference area). The system's resources (access points, online storage, databases) can also be distributed for the most effective and efficient operations through the use of transaction log data. A clearer understanding of human/computer interaction within the library setting can also be used to improve the design and utilization of other online systems and services used within libraries and other organizations.
In the former Yugoslavia and Soviet Bloc countries of Central and Eastern Europe most information technology was unavailable, unaffordable or discouraged for forty years. These…
Abstract
In the former Yugoslavia and Soviet Bloc countries of Central and Eastern Europe most information technology was unavailable, unaffordable or discouraged for forty years. These countries realise that they must improve their internal infrastructures if they are to become integral parts of the global information infrastructure. We report the results of a mail survey conducted in late 1994 and early 1995 of seventy research libraries in Croatia, Czech Republic, Hungary, Poland, Slovakia and Slovenia, building on the findings from interviews conducted with 300 persons in the region in 1993–1994. Results show that these libraries are acquiring automated processing systems, CD‐ROM databases, and connections to computer networks at a rapid rate and that automation activity has increased substantially since 1989; we report specific data on system implementation and network services by country and by type of library. ‘Access’ is their top reason to automate, which appears to mean placing the catalogue online with better search capabilities and putting items on the shelves faster — but does not necessarily mean improvements in self‐service for library users. Co‐operation and standards are highly‐ranked automation goals, yet we find anomalous results on each. Management goals focus more on speed and processing than on management information, staffing or advancing the mission of the parent organisation. Management of human resources ranks low, despite the need for wider staff involvement in the system selection process, education of technically‐trained library professionals, continuing training of staff and training of library users. We conclude with implications of these results for the region.