SlideShare a Scribd company logo
Information Retrieval : 2
Search Behavior and Search Process
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
How People Search
• User interaction with search interfaces
differs depending on
the type of task
the domain expertise of the information seeker
the amount of time and effort available to invest in theprocess
• Marchionini makes a distinction between information
lookup and exploratory search
• Information lookup tasks
are akin to fact retrieval or question answering
can be satisfied by discrete pieces of information: numbers,
dates, names, or Web sites
can work well for standard Web search interactions
How People Search
• Exploratory search is divided into learning and
investigating tasks
• Learning search
• requires more than single query-response pairs
• requires the searcher to spend time scanning and reading multiple
information items
• synthesizing content to form new understanding
Investigating refers to a longer-term process which
• involves multiple iterations that take place over perhaps very long
periods of time
• may return results that are critically assessed before being
integrated into personal and professional knowledge bases
• may be concerned with finding a large proportion of the relevant
information available
How People Search
• Information seeking can be seen as being part of
a larger process referred to as sensemaking
• Sensemaking is an iterative process of formulating
a conceptual representation from a large collection
• Russell et al. observe that most of the effort in
sensemaking goes towards the synthesis of a
good representation
• Some sensemaking activities interweave search
throughout, while others consist of doing a batch of
search followed by a batch of analysis and
synthesis
How People Search
Examples of deep analysis tasks that require
sensemaking (in addition to search)
• the legal discovery process
• epidemiology (disease tracking)
• studying customer complaints to improve service obtaining
business intelligence.
Classic x Dynamic Model
Classic notion of the information seeking process:
1. problem identification
2. articulation of information need(s)
3. query formulation
4. results evaluation
More recent models emphasize the dynamic nature of
the search process
The users learn as they search
Their information needs adjust as they see retrieval results and
other document surrogates
This dynamic process is sometimes referred to as the
berry picking model of search
Classic x Dynamic Model
The rapid response times of today’s Web search
engines allow searchers:
a to look at the results that come back
a to reformulate their query based on these results
This kind of behavior is a commonly-observed strategy
within the berry-picking approach
Sometimes it is referred to as orienteering
Jansen et a/ made a analysis of search logs and found
that the proportion of users who modified queries is
52%
Classic x Dynamic Model
Some seeking models cast the process in terms of
strategies and how choices for next steps are
made
In some cases, these models are meant to reflect conscious
planning behavior by expert searchers
In others, the models are meant to capture the less planned,
potentially more reactive behavior of a typical information seeker
Navigation x Search
Navigation: the searcher looks at an information
structure and browses among the available
information
This browsing strategy is preferrable when the
information structure is well-matched to the
user’s information need
it is mentally less taxing to recognize a piece of information than it
is to recall it
it works well only so long as appropriate links are available
If the links are not avaliable, then the browsing
experience might be frustrating
Navigation x Search
Spool discusses an example of a user looking for a
Say the user first clicks on printers, then laser
printers,
then the following sequence oflinks:
HP laser printers
HP laser printers model 9750
software for HP laser printers model 9750
software drivers for HP laser printers model
9750
software drivers for HP laser printers model 9750 for the
Win98 operating system
This kind of interaction is acceptable when each
refinement makes sense for the task at hand
Search Process
Numerous studies have been made of people engaged
in the search process
The results of these studies can help guide the design
of search interfaces
One common observation is that users often
reformulate their queries with slight
modifications
Another is that searchers often search for information
that they have previously accessed
The users’ search strategies differ when searching over
previously seenmaterials
Researchers have developed search interfaces support
both query history and revisitation
Search Process
Studies also show that it is difficult for people to
determine whether or not a document is relevant to
a topic
The less users know about a topic, the poorer judges they are of
whether a search result is relevant to that topic
Other studies found that searchers tend to look at only
the top-ranked retrieved results
Further, they are biased towards thinking the top one or
two results are better than those beneath them
Search Process
Chap 02: User Interfaces for Search, Baeza-Yates & Ribeiro-Neto, Modern Information Retrieval, 2nd Edition —p. 13
Studies also show that people are poor at
estimating how much of the relevant material they
have found
Other studies have assessed the effects of
knowledge of the search process itself
These studies have observed that experts use
different strategies than novices searchers
For instance, Tabatabai et a/ found that
expert searchers were more patient than novices
this positive attitude led to better search outcomes
Assignment
• How do we use the search behaviour in
improving IR
• Explain the Search Process and its Role in IR

More Related Content

What's hot

Role of information professionals in promoting research culture
Role of information professionals in promoting research cultureRole of information professionals in promoting research culture
Role of information professionals in promoting research culture
Khalid Mahmood
 
Data sources and collection methods
Data sources and collection methods Data sources and collection methods
Data sources and collection methods
Governance Asssessment Portal
 
Critical Analysis Survey Design
Critical Analysis Survey DesignCritical Analysis Survey Design
Critical Analysis Survey DesignNicole Brown
 
Secondary Research
Secondary ResearchSecondary Research
Secondary Research
Kaeli Vandertulip
 
SECONDARY DATA
SECONDARY DATASECONDARY DATA
SECONDARY DATA
Manish Kumar
 
Methods for Collecting Data
Methods for Collecting DataMethods for Collecting Data
Methods for Collecting Data
RosamaeRos
 
Data and data collection procedures
Data and data collection proceduresData and data collection procedures
Data and data collection procedures
Alexis Viera
 
Secondary data
Secondary dataSecondary data
Secondary data
Bharathiar university
 
Library resources and services for grant development
Library resources and services for grant developmentLibrary resources and services for grant development
Library resources and services for grant development
rds-wayne-edu
 
Systematic reviews
Systematic reviewsSystematic reviews
Systematic reviews
Lydia Pyburn
 
Secondary data
Secondary dataSecondary data
Secondary data
divyamoreslides
 
Rmethod sample
Rmethod sampleRmethod sample
Rmethod sample
razalibmuda
 
Data collection presentation
Data collection presentationData collection presentation
Data collection presentation
Kanchan Agarwal
 
Searching systematically: supporting authors of Cochrane reviews.
Searching systematically: supporting authors of Cochrane reviews.  Searching systematically: supporting authors of Cochrane reviews.
Searching systematically: supporting authors of Cochrane reviews.
ALISS
 
Researching Online and Online Learning Research
Researching Online and Online Learning Research Researching Online and Online Learning Research
Researching Online and Online Learning Research
Sanjaya Mishra
 
Secondary data and precautions to be taken while
Secondary data and precautions to be taken whileSecondary data and precautions to be taken while
Secondary data and precautions to be taken whilepremdeshmane
 
Systematic review on project actuality
Systematic review on project actualitySystematic review on project actuality
Systematic review on project actuality
ijcsit
 
Methods of data collection
Methods of data collectionMethods of data collection
Methods of data collection
Chintan Trivedi
 
Austrheim, Folkestad, Mikki & Skagen - A scoping review of PhD-candidates’ in...
Austrheim, Folkestad, Mikki & Skagen - A scoping review of PhD-candidates’ in...Austrheim, Folkestad, Mikki & Skagen - A scoping review of PhD-candidates’ in...
Austrheim, Folkestad, Mikki & Skagen - A scoping review of PhD-candidates’ in...IL Group (CILIP Information Literacy Group)
 

What's hot (20)

Role of information professionals in promoting research culture
Role of information professionals in promoting research cultureRole of information professionals in promoting research culture
Role of information professionals in promoting research culture
 
Data sources and collection methods
Data sources and collection methods Data sources and collection methods
Data sources and collection methods
 
Critical Analysis Survey Design
Critical Analysis Survey DesignCritical Analysis Survey Design
Critical Analysis Survey Design
 
Secondary Research
Secondary ResearchSecondary Research
Secondary Research
 
SECONDARY DATA
SECONDARY DATASECONDARY DATA
SECONDARY DATA
 
Methods for Collecting Data
Methods for Collecting DataMethods for Collecting Data
Methods for Collecting Data
 
Data and data collection procedures
Data and data collection proceduresData and data collection procedures
Data and data collection procedures
 
Secondary data
Secondary dataSecondary data
Secondary data
 
research
researchresearch
research
 
Library resources and services for grant development
Library resources and services for grant developmentLibrary resources and services for grant development
Library resources and services for grant development
 
Systematic reviews
Systematic reviewsSystematic reviews
Systematic reviews
 
Secondary data
Secondary dataSecondary data
Secondary data
 
Rmethod sample
Rmethod sampleRmethod sample
Rmethod sample
 
Data collection presentation
Data collection presentationData collection presentation
Data collection presentation
 
Searching systematically: supporting authors of Cochrane reviews.
Searching systematically: supporting authors of Cochrane reviews.  Searching systematically: supporting authors of Cochrane reviews.
Searching systematically: supporting authors of Cochrane reviews.
 
Researching Online and Online Learning Research
Researching Online and Online Learning Research Researching Online and Online Learning Research
Researching Online and Online Learning Research
 
Secondary data and precautions to be taken while
Secondary data and precautions to be taken whileSecondary data and precautions to be taken while
Secondary data and precautions to be taken while
 
Systematic review on project actuality
Systematic review on project actualitySystematic review on project actuality
Systematic review on project actuality
 
Methods of data collection
Methods of data collectionMethods of data collection
Methods of data collection
 
Austrheim, Folkestad, Mikki & Skagen - A scoping review of PhD-candidates’ in...
Austrheim, Folkestad, Mikki & Skagen - A scoping review of PhD-candidates’ in...Austrheim, Folkestad, Mikki & Skagen - A scoping review of PhD-candidates’ in...
Austrheim, Folkestad, Mikki & Skagen - A scoping review of PhD-candidates’ in...
 

Similar to Information retrieval 2 search behaviour and search process

A Qualitative Research Question Paper
A Qualitative Research Question PaperA Qualitative Research Question Paper
A Qualitative Research Question Paper
Help Paper Frostburg State University
 
slides_chap02.pdf
slides_chap02.pdfslides_chap02.pdf
slides_chap02.pdf
lekhacce
 
Data Collection I Available Data and Observation OVERVIE.docx
Data Collection I Available Data and Observation OVERVIE.docxData Collection I Available Data and Observation OVERVIE.docx
Data Collection I Available Data and Observation OVERVIE.docx
theodorelove43763
 
Enhancing Information Retrieval by Personalization Techniques
Enhancing Information Retrieval by Personalization TechniquesEnhancing Information Retrieval by Personalization Techniques
Enhancing Information Retrieval by Personalization Techniques
veningstonk
 
MethodsofDataCollection.pdf
MethodsofDataCollection.pdfMethodsofDataCollection.pdf
MethodsofDataCollection.pdf
ssuser9878d0
 
MethodsofDataCollection.pdf
MethodsofDataCollection.pdfMethodsofDataCollection.pdf
MethodsofDataCollection.pdf
MohdTaufiqIshak
 
Query formulation process
Query formulation processQuery formulation process
Query formulation processmalathimurugan
 
A Research Plan to Study Impact of a Collaborative Web Search Tool on Novice'...
A Research Plan to Study Impact of a Collaborative Web Search Tool on Novice'...A Research Plan to Study Impact of a Collaborative Web Search Tool on Novice'...
A Research Plan to Study Impact of a Collaborative Web Search Tool on Novice'...
Karthikeyan Umapathy
 
Research Methodology Of The Research Approach
Research Methodology Of The Research ApproachResearch Methodology Of The Research Approach
Research Methodology Of The Research Approach
Jessica Howard
 
Data Collection Methods in Qualitative Research- Divergent Insights
Data Collection Methods in Qualitative Research- Divergent InsightsData Collection Methods in Qualitative Research- Divergent Insights
Data Collection Methods in Qualitative Research- Divergent Insights
Divergent Insights
 
Research design presentation ppp final
Research design presentation ppp  finalResearch design presentation ppp  final
Research design presentation ppp final
jrazunguzwa
 
Slides | Targeting the librarian’s role in research services
Slides | Targeting the librarian’s role in research servicesSlides | Targeting the librarian’s role in research services
Slides | Targeting the librarian’s role in research services
Library_Connect
 
Research Methodology For A Researcher
Research Methodology For A ResearcherResearch Methodology For A Researcher
Research Methodology For A Researcher
Renee Wardowski
 
Classroom-Based-Action-Research.pptx
Classroom-Based-Action-Research.pptxClassroom-Based-Action-Research.pptx
Classroom-Based-Action-Research.pptx
MyleneDelaPena2
 
Doctor onlineneeds
Doctor onlineneedsDoctor onlineneeds
Doctor onlineneeds
Alex Sanchez
 
Information seeking process
Information seeking processInformation seeking process
Information seeking process
Govt. P.G. College Sendhwa, Barwani (M.P.)
 
Abraham
AbrahamAbraham
Abrahamanesah
 
Hahn "Student perspectives on personalized account-based recommender systems ...
Hahn "Student perspectives on personalized account-based recommender systems ...Hahn "Student perspectives on personalized account-based recommender systems ...
Hahn "Student perspectives on personalized account-based recommender systems ...
National Information Standards Organization (NISO)
 
Research Methodology Module-04
Research Methodology Module-04Research Methodology Module-04
Research Methodology Module-04
Kishor Ade
 

Similar to Information retrieval 2 search behaviour and search process (20)

A Qualitative Research Question Paper
A Qualitative Research Question PaperA Qualitative Research Question Paper
A Qualitative Research Question Paper
 
slides_chap02.pdf
slides_chap02.pdfslides_chap02.pdf
slides_chap02.pdf
 
Data Collection I Available Data and Observation OVERVIE.docx
Data Collection I Available Data and Observation OVERVIE.docxData Collection I Available Data and Observation OVERVIE.docx
Data Collection I Available Data and Observation OVERVIE.docx
 
Enhancing Information Retrieval by Personalization Techniques
Enhancing Information Retrieval by Personalization TechniquesEnhancing Information Retrieval by Personalization Techniques
Enhancing Information Retrieval by Personalization Techniques
 
MethodsofDataCollection.pdf
MethodsofDataCollection.pdfMethodsofDataCollection.pdf
MethodsofDataCollection.pdf
 
MethodsofDataCollection.pdf
MethodsofDataCollection.pdfMethodsofDataCollection.pdf
MethodsofDataCollection.pdf
 
Query formulation process
Query formulation processQuery formulation process
Query formulation process
 
A Research Plan to Study Impact of a Collaborative Web Search Tool on Novice'...
A Research Plan to Study Impact of a Collaborative Web Search Tool on Novice'...A Research Plan to Study Impact of a Collaborative Web Search Tool on Novice'...
A Research Plan to Study Impact of a Collaborative Web Search Tool on Novice'...
 
Research Methodology Of The Research Approach
Research Methodology Of The Research ApproachResearch Methodology Of The Research Approach
Research Methodology Of The Research Approach
 
Data Collection Methods in Qualitative Research- Divergent Insights
Data Collection Methods in Qualitative Research- Divergent InsightsData Collection Methods in Qualitative Research- Divergent Insights
Data Collection Methods in Qualitative Research- Divergent Insights
 
Research design presentation ppp final
Research design presentation ppp  finalResearch design presentation ppp  final
Research design presentation ppp final
 
Slides | Targeting the librarian’s role in research services
Slides | Targeting the librarian’s role in research servicesSlides | Targeting the librarian’s role in research services
Slides | Targeting the librarian’s role in research services
 
Research Methodology For A Researcher
Research Methodology For A ResearcherResearch Methodology For A Researcher
Research Methodology For A Researcher
 
Classroom-Based-Action-Research.pptx
Classroom-Based-Action-Research.pptxClassroom-Based-Action-Research.pptx
Classroom-Based-Action-Research.pptx
 
Doctor onlineneeds
Doctor onlineneedsDoctor onlineneeds
Doctor onlineneeds
 
Information seeking process
Information seeking processInformation seeking process
Information seeking process
 
Abraham
AbrahamAbraham
Abraham
 
CHAPTER -12 it.pptx
CHAPTER -12 it.pptxCHAPTER -12 it.pptx
CHAPTER -12 it.pptx
 
Hahn "Student perspectives on personalized account-based recommender systems ...
Hahn "Student perspectives on personalized account-based recommender systems ...Hahn "Student perspectives on personalized account-based recommender systems ...
Hahn "Student perspectives on personalized account-based recommender systems ...
 
Research Methodology Module-04
Research Methodology Module-04Research Methodology Module-04
Research Methodology Module-04
 

More from Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
Vaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
Vaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
Vaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
Vaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
Vaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
Vaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
Vaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
Vaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
Vaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
Vaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
Vaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
Vaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
Vaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
Vaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
Vaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
Vaibhav Khanna
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Recently uploaded

Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 

Recently uploaded (20)

Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 

Information retrieval 2 search behaviour and search process

  • 1. Information Retrieval : 2 Search Behavior and Search Process Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. How People Search • User interaction with search interfaces differs depending on the type of task the domain expertise of the information seeker the amount of time and effort available to invest in theprocess • Marchionini makes a distinction between information lookup and exploratory search • Information lookup tasks are akin to fact retrieval or question answering can be satisfied by discrete pieces of information: numbers, dates, names, or Web sites can work well for standard Web search interactions
  • 3. How People Search • Exploratory search is divided into learning and investigating tasks • Learning search • requires more than single query-response pairs • requires the searcher to spend time scanning and reading multiple information items • synthesizing content to form new understanding Investigating refers to a longer-term process which • involves multiple iterations that take place over perhaps very long periods of time • may return results that are critically assessed before being integrated into personal and professional knowledge bases • may be concerned with finding a large proportion of the relevant information available
  • 4. How People Search • Information seeking can be seen as being part of a larger process referred to as sensemaking • Sensemaking is an iterative process of formulating a conceptual representation from a large collection • Russell et al. observe that most of the effort in sensemaking goes towards the synthesis of a good representation • Some sensemaking activities interweave search throughout, while others consist of doing a batch of search followed by a batch of analysis and synthesis
  • 5. How People Search Examples of deep analysis tasks that require sensemaking (in addition to search) • the legal discovery process • epidemiology (disease tracking) • studying customer complaints to improve service obtaining business intelligence.
  • 6. Classic x Dynamic Model Classic notion of the information seeking process: 1. problem identification 2. articulation of information need(s) 3. query formulation 4. results evaluation More recent models emphasize the dynamic nature of the search process The users learn as they search Their information needs adjust as they see retrieval results and other document surrogates This dynamic process is sometimes referred to as the berry picking model of search
  • 7. Classic x Dynamic Model The rapid response times of today’s Web search engines allow searchers: a to look at the results that come back a to reformulate their query based on these results This kind of behavior is a commonly-observed strategy within the berry-picking approach Sometimes it is referred to as orienteering Jansen et a/ made a analysis of search logs and found that the proportion of users who modified queries is 52%
  • 8. Classic x Dynamic Model Some seeking models cast the process in terms of strategies and how choices for next steps are made In some cases, these models are meant to reflect conscious planning behavior by expert searchers In others, the models are meant to capture the less planned, potentially more reactive behavior of a typical information seeker
  • 9. Navigation x Search Navigation: the searcher looks at an information structure and browses among the available information This browsing strategy is preferrable when the information structure is well-matched to the user’s information need it is mentally less taxing to recognize a piece of information than it is to recall it it works well only so long as appropriate links are available If the links are not avaliable, then the browsing experience might be frustrating
  • 10. Navigation x Search Spool discusses an example of a user looking for a Say the user first clicks on printers, then laser printers, then the following sequence oflinks: HP laser printers HP laser printers model 9750 software for HP laser printers model 9750 software drivers for HP laser printers model 9750 software drivers for HP laser printers model 9750 for the Win98 operating system This kind of interaction is acceptable when each refinement makes sense for the task at hand
  • 11. Search Process Numerous studies have been made of people engaged in the search process The results of these studies can help guide the design of search interfaces One common observation is that users often reformulate their queries with slight modifications Another is that searchers often search for information that they have previously accessed The users’ search strategies differ when searching over previously seenmaterials Researchers have developed search interfaces support both query history and revisitation
  • 12. Search Process Studies also show that it is difficult for people to determine whether or not a document is relevant to a topic The less users know about a topic, the poorer judges they are of whether a search result is relevant to that topic Other studies found that searchers tend to look at only the top-ranked retrieved results Further, they are biased towards thinking the top one or two results are better than those beneath them
  • 13. Search Process Chap 02: User Interfaces for Search, Baeza-Yates & Ribeiro-Neto, Modern Information Retrieval, 2nd Edition —p. 13 Studies also show that people are poor at estimating how much of the relevant material they have found Other studies have assessed the effects of knowledge of the search process itself These studies have observed that experts use different strategies than novices searchers For instance, Tabatabai et a/ found that expert searchers were more patient than novices this positive attitude led to better search outcomes
  • 14. Assignment • How do we use the search behaviour in improving IR • Explain the Search Process and its Role in IR