Understanding PubMed(R) user search behavior through log analysis
نویسندگان
چکیده
منابع مشابه
Understanding PubMed® user search behavior through log analysis
This article reports on a detailed investigation of PubMed users' needs and behavior as a step toward improving biomedical information retrieval. PubMed is providing free service to researchers with access to more than 19 million citations for biomedical articles from MEDLINE and life science journals. It is accessed by millions of users each day. Efficient search tools are crucial for biomedic...
متن کاملUnderstanding User Behavior Through Log Data and Analysis
1. Overview of Log Data and Analysis in HCI Behavioral logs are traces of human behavior seen through the lenses of sensors that capture and record user activity. They include behavior ranging from low-level keystrokes to rich audio and video recordings. Traces of behavior have been gathered in psychology studies since the 1930s [Skinner, 1938], and with the advent of computer-based application...
متن کاملAnalysis of User query refinement behavior based on semantic features: user log analysis of Ganj database (IranDoc)
Background and Aim: Information systems cannot be well designed or developed without a clear understanding of needs of users, manner of their information seeking and evaluating. This research has been designed to analyze the Ganj (Iranian research institute of science and technology database) users’ query refinement behaviors via log analysis. Methods: The method of this research is log anal...
متن کاملUnderstanding User Behavior Geospatially
Understanding users is an essential task for providing personal Web experience and targeted advertisements. Current commercial or research systems try to understand users from their online behaviors, for example, how they search, read and write on the Web. However, this type of approaches missed a large part of people’s everyday life, or called ‘physical’ behaviors. The physical behaviors inclu...
متن کاملUnderstanding User Behavior towards Passwords through Acceptance and Use Modelling
Computer security is a major issue facing the world we inhabit. Computer systems in a multitude of institutions and organizations hold our personal information. Furthermore, we rely on the safe working of computer systems to not only protect that data, but allow us to take advantage of the benefits technology has to offer. Various kinds of security technology protect these systems. However, the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Database
سال: 2009
ISSN: 1758-0463
DOI: 10.1093/database/bap018