Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

ASA conference Feb 2013


Published on

My presentation given at the Association of Subscription Agents annual conference, Feb 2013.

It was titled Understanding how researchers and practitioners use STM information, but the specific theme was understanding how to design information products and services for researchs and practitioners against a background of information abundance (aka information overload).

  • The final result was amazing, and I highly recommend ⇒ ⇐ to anyone in the same mindset as me.
    Are you sure you want to  Yes  No
    Your message goes here
  • Writing good research paper is quite easy and very difficult simultaneously. It depends on the individual skill set also. You can get help from research paper writing. Check out, please ⇒ ⇐
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

ASA conference Feb 2013

  1. 1. Understanding howresearchers and practitioners use STM information Mark Ware @mrkwr ASA Conference, 26 Feb 2013
  2. 2. How data analytics and field research are transforming our understanding of researcher andpractitioner use of STM information
  3. 3. WHAT do we know about the ways STM information is used?
  4. 4. And HOW do we know it?
  5. 5. There may be better ways ...
  6. 6. Reading studies go back decades e.g. average numbers of readings have increased ( Tenopir) Source: Tenopir, C (2007). What does usage data tell us about our users? Online Information, London
  7. 7. Reading studies go back decades & reading behaviour varies across disciplines ( Tenopir) Source: Tenopir, C (2007). What does usage data tell us about our users? Online Information, London
  8. 8. So publishers can still lackin-depth understanding of:•  how researchers use content•  how it integrates with other information•  the context in which content used•  which articles were used, by whom, where and when?•  or which parts of articles were used?
  9. 9. It may be even worse ...Percentage of unique visitors that do not come from recognisedsources (known IP ranges, authenticated, or registered)Geoff Bilder (2009) Brave Adventures: New Publishing Models for the Now World, SSP, Baltimore
  10. 10. Why was this?•  cost & complexity of finding out•  intermediation – libraries and agents•  less value in print world anyway•  but also, publishers may have thought they understood enough
  11. 11. The wider information ecosystem is complexRIN (2009) Patterns of information use and exchange: case studies of researchers in the life sciences
  12. 12. Case studies can provide a fuller understanding of differences between disciplines Humanities Physical SciencesRIN (2011) Collaborative yet independent: Information practices in the physical sciences
  13. 13. Large-scale surveys can provide insight, especially if repeated Inger/Gardner: How Readers Discover Content in Scholarly Journals (Renew, 2012)
  14. 14. Whats new•  lots of data!•  near-real-time data collection•  mobile devices = personal data•  point-of-care use & similar•  Big Data analytics•  altmetrics – using data to measure impact•  CRIS and research metrics/evaluation•  and coming up, distributed annotation (
  15. 15. Deep log analysis (e.g. CIBER) offers one approach •  what they actually do (online), not what they say or wish they do. E.g.: •  very little time reading in the digital environment •  Only 1–3 pages viewed & >50% of all visitors never come back •  PDFs downloaded, but saved rather than read offlineSource: Nicholas & Clark (2012) Reading in the digital environment. Learned Publishing doi: 10.1087/20120203
  16. 16. More granular data onreading history now possible
  17. 17. Eye-tracking testing to improve UX
  18. 18. Information overload may be a truism Graph adapted from Gillam et al: The Healthcare Singularity and the Age of Semantic Medicine. Chapter in The Fourth Paradigm (2009)
  19. 19. and a marketing cliché
  20. 20. Information abundance is a fact ... BUT What keeps us awake at night is notthat all this information will cause us tohave a mental breakdown but that weare not getting enough of theinformation that we need —David Weinberger [my emphasis]
  21. 21. Designing products forinfo-overloaded users•  Data/Information pyramid: knowing- by-reducing •  selective, or filtering out•  Better filters – filtering forward •  surfacing relevant information, at the right time, in the right context
  22. 22. Workflow solutions •  Combining (filtered) content & software tools, integrated with user work/information environment •  Improved certainty and consistency of decision making •  Enhanced of productivity •  Certainty in terms of
  23. 23. Designing workflow solutions: contextual enquiry •  Combines multiple methods, e.g. •  surveys •  cluster / conjoint analysis •  on-the-job observation •  Three minutes method (Thomson) •  25–50 interviews per user •  behaviour 3 mins before/after using the information / serviceHarrington & Tjan 2008 Transforming Strategy One Customer at a Time, Harvard Business Review
  24. 24. User segmentation •  We ask editors: Do you know the profile of specific users? Who are you targeting? The CHOs? The Male Social Glue influencers? We ask: who is more valuable? Which segment? •  Our audience follows an 80-20 rule: 20% of the audience is of high value to us. 80% cost us more than the revenue they generate, for example, if they watch many long videos. Source: Outsell (2010) eMedia Organization Part III: Analytics-Wired Content
  25. 25. User segmentation: goals•  to identify differentiated segments•  clear identifiable differences•  representing real behaviour and/or attitudinal differences•  allowing prediction of behaviour of future users
  26. 26. User segmentation: goals•  to use data to identify differentiated segments•  clear identifiable statistically significant differences•  representing real behaviour and/or attitudinal differences•  allowing statistically valid prediction of behaviour of future users
  27. 27. User segmentation: approach•  Large, detailed surveys•  Factor analysis ➜ correlated, differentiating statements•  Cluster analysis ➜ possible segmentations•  Test potential segmentations by interviewing
  28. 28. OvidMD and ClinicalKey Comprehensive? Trusted? Fast?Source: Wolters Kluwer; Elsevier
  29. 29. What sort of questions might we answer (or try to)?•  What are the different barriers potential users face?•  Who are the potential customers for possible new services?•  How do different market segments value different features, and how might these be grouped? •  What new products / services are missing from out portfolios?
  30. 30. Why should we bother? •  If your market is experiencing discontinuity •  If you lack clear value propositions •  If you rely too heavily on channel segmentation •  If you sense that you face new customer demands and competition Harrington & Tjan 2008 Transforming Strategy One Customer at a Time, Harvard Business Review
  31. 31. Some conclusions•  Analytics capabilities are now a core requirement•  Opportunities to borrow from B2C•  As content commoditises, new ways of adding value become critical•  Content / Data are likely to be distributed across the web ➜ open for new entrants to create new services
  32. 32.