SlideShare a Scribd company logo
1 of 31
CoSense: Enhancing Sensemaking for Collaborative Web Search Sharoda A. Paul Meredith Ringel Morris Apr 8, 2009
Getting information off the Internet is like taking a drink from a fire hydrant - Mitchell Kapor
Making sense of information found during a Web search task can be daunting
During  collaborative  Web search tasks, making sense of information can be even more complex and challenging “ How does sensemaking occur during collaborative Web search task?”
Goals ,[object Object],[object Object]
Background: Sensemaking  ,[object Object],[object Object],Sensemaking is finding meaning or understanding of information ,[object Object]
Background: Collaborative Sensemaking ,[object Object],[object Object],[object Object],[object Object]
Background: Collaborative Web search ,[object Object],[object Object],[object Object]
What we did ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SearchTogether (UIST, 2007) Query history Search session Add comments and ratings to Web pages Chat with collaborators
SearchTogether: Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Formative study: Design ,[object Object],Phase 1 Phase 2 Group ST ST ST ,[object Object],[object Object],[object Object],Data collection SearchTogether Tools used 6 groups (3 in each group) Participants Vacation planning 2-phase design Task
Formative study: Findings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CoSense ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Database SearchTogether CoSense
Search strategies view (1)
Search strategies view (2)
Timeline view
Workspace view
Chat-centric view
Evaluation of CoSense ,[object Object],[object Object],[object Object],[object Object],[object Object],Data collection SearchTogether and CoSense Tools used 18 participants (4 in each group) Participants Vacation planning  2-phase design Task
Evaluation of CoSense: Data collection ,[object Object],[object Object],[object Object],[object Object],[object Object],“ Which group member do you think contributed most to the task and why?” “ Which websites generated a lot of discussion?”
Evaluation of CoSense: Findings ,[object Object],[object Object],[object Object],[object Object]
CoSense view usage: During task (1) ,[object Object],[object Object],[object Object],[object Object],[object Object]
CoSense view usage: During task (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
CoSense view usage: During questionnaire  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CoSense usage during handoff “ The tag clouds and statistics on how many queries had been done, what were the group’s sites, and what is their popularity, helped me immensely …I was able to plan [the search] better using the websites and keywords ” “ The flow of the search was hard to tell [by looking at SearchTogether]. The timeline in CoSense helped because of the information about order of queries. I identified what had already been done ”
Discussion ,[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Future work ,[object Object],[object Object],[object Object]
Thank you! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

Similar to Enhancing collaborative web search sensemaking with CoSense

A Model Of Collaborative Search
A Model Of Collaborative SearchA Model Of Collaborative Search
A Model Of Collaborative SearchGene Golovchinsky
 
Competitive Intelligence: An Island of Structure in an Unstructured Ocean
Competitive Intelligence: An Island of Structure in an Unstructured OceanCompetitive Intelligence: An Island of Structure in an Unstructured Ocean
Competitive Intelligence: An Island of Structure in an Unstructured OceanInstitute for Knowledge Mobilization
 
Content tagging and recommender systems
Content tagging and recommender systemsContent tagging and recommender systems
Content tagging and recommender systemsmettadata
 
Information Seeking with Social Signals: Anatomy of a Social Tag-based Explor...
Information Seeking with Social Signals: Anatomy of a Social Tag-based Explor...Information Seeking with Social Signals: Anatomy of a Social Tag-based Explor...
Information Seeking with Social Signals: Anatomy of a Social Tag-based Explor...Ed Chi
 
Leveraging Technology in Collaborative Work - Foundations
Leveraging Technology in Collaborative Work - FoundationsLeveraging Technology in Collaborative Work - Foundations
Leveraging Technology in Collaborative Work - FoundationsStephen Judd
 
Non-MARC metadata training for "traditional" catalogers: the role and importa...
Non-MARC metadata training for "traditional" catalogers: the role and importa...Non-MARC metadata training for "traditional" catalogers: the role and importa...
Non-MARC metadata training for "traditional" catalogers: the role and importa...Kelly Thompson
 
PhD proposal: Specialized heuristics for crowdsourcing website design
PhD proposal: Specialized heuristics for crowdsourcing website designPhD proposal: Specialized heuristics for crowdsourcing website design
PhD proposal: Specialized heuristics for crowdsourcing website designdonellemckinley
 
Incentive Architecture 1224362486736986 8
Incentive Architecture 1224362486736986 8Incentive Architecture 1224362486736986 8
Incentive Architecture 1224362486736986 8Marianne Sweeny
 
Evaluation Of A Research Method
Evaluation Of A Research MethodEvaluation Of A Research Method
Evaluation Of A Research MethodSusan Kennedy
 
Social information Access Tutorial at UMAP 2014
Social information Access Tutorial at UMAP 2014Social information Access Tutorial at UMAP 2014
Social information Access Tutorial at UMAP 2014Peter Brusilovsky
 
Taking evidence-based professional learning conversations online: Implicatio...
Taking evidence-based professional learning conversations online:  Implicatio...Taking evidence-based professional learning conversations online:  Implicatio...
Taking evidence-based professional learning conversations online: Implicatio...mddhani
 
Ice 2010 presentation moroney
Ice 2010 presentation moroneyIce 2010 presentation moroney
Ice 2010 presentation moroneymddhani
 
Peter Senge's Learning Organization
Peter Senge's Learning OrganizationPeter Senge's Learning Organization
Peter Senge's Learning OrganizationAlyssaGracia
 
303 learning organization
303  learning organization303  learning organization
303 learning organizationAlyssaGracia
 
Presentation at School of Information and Library Science, UNC, USA
Presentation at School of Information and Library Science, UNC, USAPresentation at School of Information and Library Science, UNC, USA
Presentation at School of Information and Library Science, UNC, USACharles Seger
 
Information Access on Social Web
Information Access on Social WebInformation Access on Social Web
Information Access on Social WebDaqing He
 
Jill Freyne - Collecting community wisdom: integrating social search and soci...
Jill Freyne - Collecting community wisdom: integrating social search and soci...Jill Freyne - Collecting community wisdom: integrating social search and soci...
Jill Freyne - Collecting community wisdom: integrating social search and soci...DERIGalway
 

Similar to Enhancing collaborative web search sensemaking with CoSense (20)

A Model Of Collaborative Search
A Model Of Collaborative SearchA Model Of Collaborative Search
A Model Of Collaborative Search
 
Competitive intelligence
Competitive intelligenceCompetitive intelligence
Competitive intelligence
 
Competitive Intelligence: An Island of Structure in an Unstructured Ocean
Competitive Intelligence: An Island of Structure in an Unstructured OceanCompetitive Intelligence: An Island of Structure in an Unstructured Ocean
Competitive Intelligence: An Island of Structure in an Unstructured Ocean
 
Content tagging and recommender systems
Content tagging and recommender systemsContent tagging and recommender systems
Content tagging and recommender systems
 
Information Seeking with Social Signals: Anatomy of a Social Tag-based Explor...
Information Seeking with Social Signals: Anatomy of a Social Tag-based Explor...Information Seeking with Social Signals: Anatomy of a Social Tag-based Explor...
Information Seeking with Social Signals: Anatomy of a Social Tag-based Explor...
 
Leveraging Technology in Collaborative Work - Foundations
Leveraging Technology in Collaborative Work - FoundationsLeveraging Technology in Collaborative Work - Foundations
Leveraging Technology in Collaborative Work - Foundations
 
Non-MARC metadata training for "traditional" catalogers: the role and importa...
Non-MARC metadata training for "traditional" catalogers: the role and importa...Non-MARC metadata training for "traditional" catalogers: the role and importa...
Non-MARC metadata training for "traditional" catalogers: the role and importa...
 
PhD proposal: Specialized heuristics for crowdsourcing website design
PhD proposal: Specialized heuristics for crowdsourcing website designPhD proposal: Specialized heuristics for crowdsourcing website design
PhD proposal: Specialized heuristics for crowdsourcing website design
 
Social Semantic Search and Browsing
Social Semantic Search and BrowsingSocial Semantic Search and Browsing
Social Semantic Search and Browsing
 
Incentive Architecture 1224362486736986 8
Incentive Architecture 1224362486736986 8Incentive Architecture 1224362486736986 8
Incentive Architecture 1224362486736986 8
 
Evaluation Of A Research Method
Evaluation Of A Research MethodEvaluation Of A Research Method
Evaluation Of A Research Method
 
Social information Access Tutorial at UMAP 2014
Social information Access Tutorial at UMAP 2014Social information Access Tutorial at UMAP 2014
Social information Access Tutorial at UMAP 2014
 
Taking evidence-based professional learning conversations online: Implicatio...
Taking evidence-based professional learning conversations online:  Implicatio...Taking evidence-based professional learning conversations online:  Implicatio...
Taking evidence-based professional learning conversations online: Implicatio...
 
Ice 2010 presentation moroney
Ice 2010 presentation moroneyIce 2010 presentation moroney
Ice 2010 presentation moroney
 
Peter Senge's Learning Organization
Peter Senge's Learning OrganizationPeter Senge's Learning Organization
Peter Senge's Learning Organization
 
303 learning organization
303  learning organization303  learning organization
303 learning organization
 
ASCD Presentation 16MAR09
ASCD Presentation 16MAR09ASCD Presentation 16MAR09
ASCD Presentation 16MAR09
 
Presentation at School of Information and Library Science, UNC, USA
Presentation at School of Information and Library Science, UNC, USAPresentation at School of Information and Library Science, UNC, USA
Presentation at School of Information and Library Science, UNC, USA
 
Information Access on Social Web
Information Access on Social WebInformation Access on Social Web
Information Access on Social Web
 
Jill Freyne - Collecting community wisdom: integrating social search and soci...
Jill Freyne - Collecting community wisdom: integrating social search and soci...Jill Freyne - Collecting community wisdom: integrating social search and soci...
Jill Freyne - Collecting community wisdom: integrating social search and soci...
 

Recently uploaded

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Recently uploaded (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Enhancing collaborative web search sensemaking with CoSense

  • 1. CoSense: Enhancing Sensemaking for Collaborative Web Search Sharoda A. Paul Meredith Ringel Morris Apr 8, 2009
  • 2. Getting information off the Internet is like taking a drink from a fire hydrant - Mitchell Kapor
  • 3. Making sense of information found during a Web search task can be daunting
  • 4. During collaborative Web search tasks, making sense of information can be even more complex and challenging “ How does sensemaking occur during collaborative Web search task?”
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. SearchTogether (UIST, 2007) Query history Search session Add comments and ratings to Web pages Chat with collaborators
  • 11.
  • 12.
  • 13.
  • 14.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. CoSense usage during handoff “ The tag clouds and statistics on how many queries had been done, what were the group’s sites, and what is their popularity, helped me immensely …I was able to plan [the search] better using the websites and keywords ” “ The flow of the search was hard to tell [by looking at SearchTogether]. The timeline in CoSense helped because of the information about order of queries. I identified what had already been done ”
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.

Editor's Notes

  1. Good afternoon ladies and gentleman, thank you for attending this talk. I am Sharoda Paul from Penn State University and I’m going to present our paper ‘Cosense: Enhancing Sensemaking in Collaborative Web Search, written with my co-author Meredith Morris of Microsoft Research. The study I am presenting explored how people make sense of information found during collaborative Web search tasks. For instance, if a group of friends are planning to go on a vacation, they might each go online and search the Web for fun activities to add to their vacation itinerary. The question we explored in our study is ‘how do people make sense of the information generated during such a collaborative Web search task.