Search results

1 – 10 of 12
Article
Publication date: 1 March 1990

Karen Markey Drabenstott and Diane Vizine‐Goetz

Search trees presented in this article control system responses and determine appropriate subject searching approaches to user queries. Users do not explicitly choose a particular…

Abstract

Search trees presented in this article control system responses and determine appropriate subject searching approaches to user queries. Users do not explicitly choose a particular approach. Rather, systems respond with an approach based on the extent to which queries match the catalog's controlled vocabulary and produce retrievals. The benefit of incorporating search trees into online bibliographic systems is the ability to place the responsibility of determining which approach produces the best results on the system.

Details

Library Hi Tech, vol. 8 no. 3
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 January 1990

Denise Kaplan, Joseph R. Matthews, William Horton, Karen Markey Drabenstott, Charles R. Hildreth, Katharina Klemperer, Lare Mischo, K.T. Noerr and Marilee Winiarski

Most second‐generation online catalogs give libraries some capability to customize help messages, screen displays, and system prompts. Microcomputer applications designed or…

Abstract

Most second‐generation online catalogs give libraries some capability to customize help messages, screen displays, and system prompts. Microcomputer applications designed or mounted locally may offer even more flexibility. Commercially available information systems offer the user some type of assistance, even when not totally profitable. The librarian has become an active, if not always willing, participant in the design of his or her system's user interface. Knowledge of both patrons and collections can have direct bearing on the structure and effectiveness of the library's automated system, its interface, and online help features.

Details

Library Hi Tech, vol. 8 no. 1
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 January 1994

Karen M. Drabenstott and Marjorie S. Weller

Library users continue to experience difficulty in using the online catalog, particularly in the area of subject access. This project describes a test of a new design for subject…

Abstract

Library users continue to experience difficulty in using the online catalog, particularly in the area of subject access. This project describes a test of a new design for subject access to online catalogs. The new design requires a wide range of subject searching capabilities and search trees to govern the system's selection of searching capabilities in response to user queries. Is the performance of search trees superior to subject searching approaches chosen at random? This project is geared to make that determination.

Details

Library Hi Tech, vol. 12 no. 1
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 February 1993

Thomas A. Peters

The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a…

Abstract

The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a literature review of the first twenty‐five years of TLA poses some challenges and requires some decisions. The primary organizing principle could be a strict chronology of the published research, the research questions addressed, the automated information retrieval (IR) systems that generated the data, the results gained, or even the researchers themselves. The group of active transaction log analyzers remains fairly small in number, and researchers who use transaction logs tend to use this method more than once, so tracing the development and refinement of individuals' uses of the methodology could provide insight into the progress of the method as a whole. For example, if we examine how researchers like W. David Penniman, John Tolle, Christine Borgman, Ray Larson, and Micheline Hancock‐Beaulieu have modified their own understandings and applications of the method over time, we may get an accurate sense of the development of all applications.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 February 1993

Martin Kurth

Introduction Since the earliest transaction monitoring studies, researchers have encountered the boundaries that define transaction log analysis as a methodology for studying the…

Abstract

Introduction Since the earliest transaction monitoring studies, researchers have encountered the boundaries that define transaction log analysis as a methodology for studying the use of online information retrieval systems. Because, among other reasons, transaction log databases contain relatively few fields and lack sufficient retrieval tools, students of transaction log data have begun to ask as many questions about what transaction logs cannot reveal as they have asked about what transaction logs can reveal. Researchers have conducted transaction monitoring studies to understand the objective phenomena embodied in this statement: “Library patrons enter searches into online information retrieval systems.” Transaction log data effectively describe what searches patrons enter and when they enter them, but they don't reflect, except through inference, who enters the searches, why they enter them, and how satisfied they are with their results.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 March 1990

Richard Van Orden

With the continuing increases in computer processing and storage capabilities, the barriers to and benefits of electronic access to more information content are becoming serious…

Abstract

With the continuing increases in computer processing and storage capabilities, the barriers to and benefits of electronic access to more information content are becoming serious issues in information science research. The experiments described in this article, which address the value of content‐enriched access, are important to continued progress in information retrieval. Well‐selected content components and full‐text materials in electronic systems must be linked with improved search methodologies, better computer interfaces, and greater understanding of the structure and use of knowledge. Content‐enriched records, augmented by these other developments, will enhance the probability of users identifying the information they require.

Details

Library Hi Tech, vol. 8 no. 3
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 February 1993

Beth Sandore

The ability to conduct unobtrusive observation of user searching is a potential strength of the method of information retrieval system analysis known as transaction log analysis…

Abstract

The ability to conduct unobtrusive observation of user searching is a potential strength of the method of information retrieval system analysis known as transaction log analysis (TLA). Transaction logs supply unequivocal information about what a user typed while searching. All other methods rely on self‐reporting, which, as Nielsen points out, is not always corroborated by the logs. Regardless of where in an institution information retrieval (IR) system evaluation takes place, TLA is a method that enables library staff at all levels to examine a variety of system and user‐related activities that are recorded on the log. Dominick suggested that TLA can enable the examination of three broad categories of activity: 1) system performance and resource utilization, 2) information retrieval performance, and 3) user interaction with the IR system. This article has been divided into several sections corresponding to functional areas in a library to suggest useful applications of TLA.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 March 1996

Emma Jones

Reports on the OCLC Users’ Council meeting of February 5‐7, 1996. Issues discussed included nominations for the board of trustees, the OCLC president’s report, the Users’ Council…

120

Abstract

Reports on the OCLC Users’ Council meeting of February 5‐7, 1996. Issues discussed included nominations for the board of trustees, the OCLC president’s report, the Users’ Council executive committee report and reports on users of electronic information. Also under discussion were a number of strategies for the future.

Details

OCLC Systems & Services: International digital library perspectives, vol. 12 no. 1
Type: Research Article
ISSN: 1065-075X

Keywords

Article
Publication date: 1 February 1993

Neal K. Kaske

Introduction The central goal of transaction log analysis is to acquire new knowledge, which will help library managers, systems designers/developers, and researchers better…

Abstract

Introduction The central goal of transaction log analysis is to acquire new knowledge, which will help library managers, systems designers/developers, and researchers better understand how online information systems are used by library patrons and staffs. This knowledge can then be used to improve library services and operations through better designed systems and better allocation (or reallocation) of library resources. An example of reallocation of resources is changing schedules of public service staff to more closely match when and where patrons need help (e.g., in nonfiction, on weekends) and the relocation of terminals to where they are needed the most (e.g., to the science reference area). The system's resources (access points, online storage, databases) can also be distributed for the most effective and efficient operations through the use of transaction log data. A clearer understanding of human/computer interaction within the library setting can also be used to improve the design and utilization of other online systems and services used within libraries and other organizations.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 March 1996

CHRISTINE L. BORGMAN

In the former Yugoslavia and Soviet Bloc countries of Central and Eastern Europe most information technology was unavailable, unaffordable or discouraged for forty years. These…

Abstract

In the former Yugoslavia and Soviet Bloc countries of Central and Eastern Europe most information technology was unavailable, unaffordable or discouraged for forty years. These countries realise that they must improve their internal infrastructures if they are to become integral parts of the global information infrastructure. We report the results of a mail survey conducted in late 1994 and early 1995 of seventy research libraries in Croatia, Czech Republic, Hungary, Poland, Slovakia and Slovenia, building on the findings from interviews conducted with 300 persons in the region in 1993–1994. Results show that these libraries are acquiring automated processing systems, CD‐ROM databases, and connections to computer networks at a rapid rate and that automation activity has increased substantially since 1989; we report specific data on system implementation and network services by country and by type of library. ‘Access’ is their top reason to automate, which appears to mean placing the catalogue online with better search capabilities and putting items on the shelves faster — but does not necessarily mean improvements in self‐service for library users. Co‐operation and standards are highly‐ranked automation goals, yet we find anomalous results on each. Management goals focus more on speed and processing than on management information, staffing or advancing the mission of the parent organisation. Management of human resources ranks low, despite the need for wider staff involvement in the system selection process, education of technically‐trained library professionals, continuing training of staff and training of library users. We conclude with implications of these results for the region.

Details

Journal of Documentation, vol. 52 no. 3
Type: Research Article
ISSN: 0022-0418

Access

Year

Content type

Article (12)
1 – 10 of 12