Search results

1 – 10 of over 4000
Article
Publication date: 10 January 2024

Artur Strzelecki and Andrej Miklosik

The landscape of search engine usage has evolved since the last known data were used to calculate click-through rate (CTR) values. The objective was to provide a replicable method…

63

Abstract

Purpose

The landscape of search engine usage has evolved since the last known data were used to calculate click-through rate (CTR) values. The objective was to provide a replicable method for accessing data from the Google search engine using programmatic access and calculating CTR values from the retrieved data to show how the CTRs have changed since the last studies were published.

Design/methodology/approach

In this study, the authors present the estimated CTR values in organic search results based on actual clicks and impressions data, and establish a protocol for collecting this data using Google programmatic access. For this study, the authors collected data on 416,386 clicks, 31,648,226 impressions and 8,861,416 daily queries.

Findings

The results show that CTRs have decreased from previously reported values in both academic research and industry benchmarks. The estimates indicate that the top-ranked result in Google's organic search results features a CTR of 9.28%, followed by 5.82 and 3.11% for positions two and three, respectively. The authors also demonstrate that CTRs vary across various types of devices. On desktop devices, the CTR decreases steadily with each lower ranking position. On smartphones, the CTR starts high but decreases rapidly, with an unprecedented increase from position 13 onwards. Tablets have the lowest and most variable CTR values.

Practical implications

The theoretical implications include the generation of a current dataset on search engine results and user behavior, made available to the research community, creation of a unique methodology for generating new datasets and presenting the updated information on CTR trends. The managerial implications include the establishment of the need for businesses to focus on optimizing other forms of Google search results in addition to organic text results, and the possibility of application of this study's methodology to determine CTRs for their own websites.

Originality/value

This study provides a novel method to access real CTR data and estimates current CTRs for top organic Google search results, categorized by device.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 3 June 2022

Dan Wu and Shutian Zhang

Good abandonment behavior refers to users obtaining direct answers via search engine results pages (SERPs) without clicking any search result, which occurs commonly in mobile…

Abstract

Purpose

Good abandonment behavior refers to users obtaining direct answers via search engine results pages (SERPs) without clicking any search result, which occurs commonly in mobile search. This study aims to better understand users' good abandonment behavior and perception, and then construct a good abandonment prediction model for mobile search with improved performance.

Design/methodology/approach

In this study, an in situ user mobile search experiment (N = 43) and a crowdsourcing survey (N = 1,379) were conducted. Good abandonment behavior was analyzed from a quantitative perspective, exploring users' search behavior characteristics from four aspects: session and query, SERPs, gestures and eye-tracking data.

Findings

Users show less engagement with SERPs in good abandonment, spending less time and using fewer gestures, and they pay more visual attention to answer-like results. It was also found that good abandonment behavior is often related to users' perceived difficulty of the searching tasks and trustworthiness in the search engine. A good abandonment prediction model in mobile search was constructed with a high accuracy (97.14%).

Originality/value

This study is the first to explore eye-tracking characteristics of users' good abandonment behavior in mobile search, and to explore users' perception of their good abandonment behavior. Visual attention features are introduced into good abandonment prediction in mobile search for the first time and proved to be important predictors in the proposed model.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 4 April 2024

Artur Strzelecki

This paper aims to give an overview of the history and evolution of commercial search engines. It traces the development of search engines from their early days to their current…

Abstract

Purpose

This paper aims to give an overview of the history and evolution of commercial search engines. It traces the development of search engines from their early days to their current form as complex technology-powered systems that offer a wide range of features and services.

Design/methodology/approach

In recent years, advancements in artificial intelligence (AI) technology have led to the development of AI-powered chat services. This study explores official announcements and releases of three major search engines, Google, Bing and Baidu, of AI-powered chat services.

Findings

Three major players in the search engine market, Google, Microsoft and Baidu started to integrate AI chat into their search results. Google has released Bard, later upgraded to Gemini, a LaMDA-powered conversational AI service. Microsoft has launched Bing Chat, renamed later to Copilot, a GPT-powered by OpenAI search engine. The largest search engine in China, Baidu, released a similar service called Ernie. There are also new AI-based search engines, which are briefly described.

Originality/value

This paper discusses the strengths and weaknesses of the traditional – algorithmic powered search engines and modern search with generative AI support, and the possibilities of merging them into one service. This study stresses the types of inquiries provided to search engines, users’ habits of using search engines and the technological advantage of search engine infrastructure.

Details

Library Hi Tech News, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0741-9058

Keywords

Open Access
Article
Publication date: 27 February 2023

Vasileios Stamatis, Michail Salampasis and Konstantinos Diamantaras

In federated search, a query is sent simultaneously to multiple resources and each one of them returns a list of results. These lists are merged into a single list using the…

Abstract

Purpose

In federated search, a query is sent simultaneously to multiple resources and each one of them returns a list of results. These lists are merged into a single list using the results merging process. In this work, the authors apply machine learning methods for results merging in federated patent search. Even though several methods for results merging have been developed, none of them were tested on patent data nor considered several machine learning models. Thus, the authors experiment with state-of-the-art methods using patent data and they propose two new methods for results merging that use machine learning models.

Design/methodology/approach

The methods are based on a centralized index containing samples of documents from all the remote resources, and they implement machine learning models to estimate comparable scores for the documents retrieved by different resources. The authors examine the new methods in cooperative and uncooperative settings where document scores from the remote search engines are available and not, respectively. In uncooperative environments, they propose two methods for assigning document scores.

Findings

The effectiveness of the new results merging methods was measured against state-of-the-art models and found to be superior to them in many cases with significant improvements. The random forest model achieves the best results in comparison to all other models and presents new insights for the results merging problem.

Originality/value

In this article the authors prove that machine learning models can substitute other standard methods and models that used for results merging for many years. Our methods outperformed state-of-the-art estimation methods for results merging, and they proved that they are more effective for federated patent search.

Details

Data Technologies and Applications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 1 December 2023

Andreas Skalkos, Aggeliki Tsohou, Maria Karyda and Spyros Kokolakis

Search engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as…

Abstract

Purpose

Search engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as about search engines keeping track of their search preferences. Various search engines have been introduced to address these concerns, claiming that they protect users’ privacy. The authors call these search engines privacy-preserving search engines (PPSEs). This paper aims to investigate the factors that motivate search engine users to use PPSEs.

Design/methodology/approach

This study adopted protection motivation theory (PMT) and associated its constructs with subjective norms to build a comprehensive research model. The authors tested the research model using survey data from 830 search engine users worldwide.

Findings

The results confirm the interpretive power of PMT in privacy-related decision-making and show that users are more inclined to take protective measures when they consider that data abuse is a more severe risk and that they are more vulnerable to data abuse. Furthermore, the results highlight the importance of subjective norms in predicting and determining PPSE use. Because subjective norms refer to perceived social influences from important others to engage or refrain from protective behavior, the authors reveal that the recommendation from people that users consider important motivates them to take protective measures and use PPSE.

Research limitations/implications

Despite its interesting results, this research also has some limitations. First, because the survey was conducted online, the study environment was less controlled. Participants may have been disrupted or affected, for example, by the presence of others or background noise during the session. Second, some of the survey items could possibly be misinterpreted by the respondents in the study questionnaire, as they did not have access to clarifications that a researcher could possibly provide. Third, another limitation refers to the use of the Amazon Turk tool. According Paolacci and Chandler (2014) in comparison to the US population, the MTurk workers are more educated, younger and less religiously and politically diverse. Fourth, another limitation of this study could be that Actual Use of PPSE is self-reported by the participants. This could cause bias because it is argued that internet users’ statements may be in contrast with their actions in real life or in an experimental scenario (Berendt et al., 2005, Jensen et al., 2005); Moreover, some limitations of this study emerge from the use of PMT as the background theory of the study. PMT identifies the main factors that affect protection motivation, but other environmental and cognitive factors can also have a significant role in determining the way an individual’s attitude is formed. As Rogers (1975) argued, PMT as proposed does not attempt to specify all of the possible factors in a fear appeal that may affect persuasion, but rather a systematic exposition of a limited set of components and cognitive mediational processes that may account for a significant portion of the variance in acceptance by users. In addition, as Tanner et al. (1991) argue, the ‘PMT’s assumption that the subjects have not already developed a coping mechanism is one of its limitations. Finally, another limitation is that the sample does not include users from China, which is the second most populated country. Unfortunately, DuckDuckGo has been blocked in China, so it has not been feasible to include users from China in this study.

Practical implications

The proposed model and, specifically, the subjective norms construct proved to be successful in predicting PPSE use. This study demonstrates the need for PPSE to exhibit and advertise the technology and measures they use to protect users’ privacy. This will contribute to the effort to persuade internet users to use these tools.

Social implications

This study sought to explore the privacy attitudes of search engine users using PMT and its constructs’ association with subjective norms. It used the PMT to elucidate users’ perceptions that motivate them to privacy adoption behavior, as well as how these perceptions influence the type of search engine they use. This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSE. At the same time, this study contributes to search engine vendors by revealing that users’ need to be persuaded not only about their policy toward privacy but also by considering and implementing new strategies of diffusion that could enhance the use of the PPSE.

Originality/value

This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSEs.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 27 January 2023

Hossein Motahari-Nezhad and Aslan Sadeghdaghighi

No comprehensive statistical assessment of publication bias has been conducted in remdesivir-based intervention research for COVID-19 patients. This study aims to examine all…

Abstract

Purpose

No comprehensive statistical assessment of publication bias has been conducted in remdesivir-based intervention research for COVID-19 patients. This study aims to examine all meta-analyses of the efficacy of remdesivir interventions in COVID-19 patients and perform a statistical assessment of publication bias.

Design/methodology/approach

This is an analytic study conducted to assess the impact of publication bias on the results of meta-analyses of remdesivir-based interventions in patients infected with COVID-19. All English full-text meta-analyses published in peer-reviewed journals in 2019–2021 were included. A computerized search of PubMed and Web of Science electronic databases was performed on December 24, 2021. The trim-and-fill method calculated the number of missing studies and the adjusted cumulative effect sizes.

Findings

The final analysis comprised 21 studies with 88 outcomes. The investigation revealed missing studies in 46 outcomes (52%). Seventy-six missing studies were replaced in the outcomes using the trim-and-fill procedure. The adjusted recalculated effect sizes of the 27 outcomes increased by an average of 0.04. In comparison, the adjusted effect size of 18 outcomes fell by an average of 0.036. Only 14 out of 46 outcomes with publication bias were subjected to a gray literature search (30%). To discover related research, no gray literature search was conducted in most outcomes with publication bias (n = 32; 70%). In conclusion, the reported effect estimates regarding the effect of remdesivir in COVID-19 patients are only slightly affected by publication bias and can be considered authentic. Health-care decision-makers in COVID-19 should consider current research results when making clinical decisions.

Research limitations/implications

Most health decisions are based on the effect sizes revealed in meta-analyses. When deciding on remdesivir-based treatment for COVID-19 patients, therefore, the outcomes of this investigation may be of paramount importance to health policymakers, leading to better treatment strategies.

Practical implications

According to the results, no major publication bias and missing studies were detected on average. Therefore, the calculated effect sizes of remdesivir-based interventions on meta-analyses can be used as authentic and unbiased benchmarks by health-care decision-makers in treating patients with COVID-19.

Originality/value

This is the first study to examine the effect of publication bias and gray literature searches on the results of meta-analyses of treatment with COVID-19 (remdesivir).

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 9 April 2024

Pia Borlund, Nils Pharo and Ying-Hsang Liu

The PICCH research project contributes to opening a dialogue between cultural heritage archives and users. Hence, the users are identified and their information needs, the search…

Abstract

Purpose

The PICCH research project contributes to opening a dialogue between cultural heritage archives and users. Hence, the users are identified and their information needs, the search strategies they apply and the search challenges they experience are uncovered.

Design/methodology/approach

A combination of questionnaires and interviews is used for collection of data. Questionnaire data were collected from users of three different audiovisual archives. Semi-structured interviews were conducted with two user groups: (1) scholars searching information for research projects and (2) archivists who perform their own scholarly work and search information on behalf of others.

Findings

The questionnaire results show that the archive users mainly have an academic background. Hence, scholars and archivists constitute the target group for in-depth interviews. The interviews reveal that their information needs are multi-faceted and match the information need typology by Ingwersen. The scholars mainly apply collection-specific search strategies but have in common primarily doing keyword searching, which they typically plan in advance. The archivists do less planning owing to their knowledge of the collections. All interviewees demonstrate domain knowledge, archival intelligence and artefactual literacy in their use and mastering of the archives. The search challenges they experience can be characterised as search system complexity challenges, material challenges and metadata challenges.

Originality/value

The paper provides a rare insight into the complexity of the search situation of cultural heritage archives, and the users’ multi-facetted information needs and hence contributes to the dialogue between the archives and the users.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 12 April 2023

Shaobo Liang and Linfeng Yu

As voice search has progressively become a new way of information acquisition and human–computer interaction, this paper aims to explore the users' voice search behavior in…

Abstract

Purpose

As voice search has progressively become a new way of information acquisition and human–computer interaction, this paper aims to explore the users' voice search behavior in human–vehicle interaction.

Design/methodology/approach

This study employed mixed research methods, including questionnaires and interviews. A total of 151 Amazon MTurk volunteers were recruited to complete a questionnaire based on their most recent and impressive voice search experience. After the questionnaire, this paper conducted an online interview with the participants.

Findings

This paper studied users' voice search behavior characteristics in the context of the human–vehicle interaction and analyzed the voice search content, search need, search motivation and user satisfaction. In addition, this paper studied the barriers and suggestions for voice search in human–vehicle interaction through a content analysis of the interviews.

Practical implications

This paper's analysis of users' barriers and suggestions has a specific reference value for optimizing the voice search interaction system and improving the service.

Originality/value

This study is exploratory research that seeks to identify users' voice search needs and tasks and investigate voice search satisfaction in human–vehicle interaction context.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 7 November 2023

Janine Arantes

The purpose of this scoping rapid review was to identify and analyse existing qualitative methodologies that have been used to investigate K-12 teachers' lived experiences of…

Abstract

Purpose

The purpose of this scoping rapid review was to identify and analyse existing qualitative methodologies that have been used to investigate K-12 teachers' lived experiences of adult cyber abuse as a result of student content “going viral” to propose a novel methodological stance incorporating the Australian Online Safety Act 2021.

Design/methodology/approach

A search of Google Scholar was conducted using keywords and phrases related to cyber trauma, teachers, qualitative methods and the Online Safety Act. Inclusion criteria for the review were: (1) published in English, (2) focused on teachers' experiences of online abuse and cyberbullying associated with viral posts and (3) employed a qualitative inquiry methodology. Full-text articles were obtained for those that met the inclusion criteria. Data were extracted and analysed using a PRISMA flowchart and inductive thematic analysis.

Findings

This methodology is considered to be justified, as the eSafety Commissioner's Safety-by-Design principles do not have any legal or regulatory enforceability, whereas the Online Safety Act 2021 provides the Australian eSafety Commissioner an avenue to drive greater algorithmic transparency and accountability.

Research limitations/implications

The findings of this review informed the development of a novel methodological stance for investigating Australian teachers' lived experiences of adult cyber abuse associated with viral posts. It provides a methodological positioning to support trauma informed qualitative research into adult cyber abuse, informed by the work of the eSafety Commissioner and the Online Safety Act.

Originality/value

Cybertrauma is described as “any trauma that is a result of self- or, other-directed interaction with, mediated through, or from any electronic Internet/cyberspace ready device or machine learning algorithm, that results in impact now or the future” (Knibbs, 2021). It may result from the tracking of movement through various mobile phone features and applications such as location sharing, non-consensual monitoring of social media, and humiliation or punishment through the sharing of intimate images online, through to direct messages of abuse or threats of violence or humiliation. These actions are further perpetuated through automated searches, insights and recommendations on social media (i.e. engagement metrics promote memes, Facebook posts, Tweets, Tiktoks, Youtubes and so on). This is a novel methodology, as it not only considers direct cybertrauma but also automated forms of cybertrauma.

Details

Qualitative Research Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1443-9883

Keywords

Article
Publication date: 18 December 2023

Nili Steinfeld, Azi Lev-On and Hama Abu-Kishk

This study presents an innovative approach to analyzing user behavior when performing digital tasks by integrating eye-tracking technology. Through the measurement of user scan…

151

Abstract

Purpose

This study presents an innovative approach to analyzing user behavior when performing digital tasks by integrating eye-tracking technology. Through the measurement of user scan patterns, gaze and attention during task completion, the authors gain valuable insights into users' approaches and execution of these tasks.

Design/methodology/approach

In this research, the authors conducted an observational study that centered on assessing the digital skills of individuals with limited proficiency who enrolled in a computer introductory course. A group of 19 participants were tasked with completing various online assignments both before and after completing the course.

Findings

The study findings indicate a significant improvement in participants' skills, particularly in basic and straightforward applications. However, advancements in more sophisticated utilization, such as mastering efficient search techniques or harnessing the Internet for enhanced situational awareness, demonstrate only marginal enhancement.

Originality/value

In recent decades, extensive research has been conducted on the issue of digital inequality, given its significant societal implications. This paper introduces a novel tool designed to analyze digital inequalities and subsequently employs it to evaluate the effectiveness of “LEHAVA,” the largest government-sponsored program aimed at mitigating these disparities in Israel.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

1 – 10 of over 4000