[Asis-l] JASIST TOC, Vol 53, Number 4

Richard Hill rhill at asis.org
Tue Dec 31 13:49:48 EST 2002


Journal of the American Society for Information Science and Technology
JASIST
VOLUME 53, NUMBER 14

[Note: below are URLs for viewing contents of JASIST from past 
issues.  Below the contents of Bert Boyce's "In This Issue" for Research 
Articles and Brief Communications, and Barbara Wildemuth’s introduction to 
“Perspectives On...Effective Methods for Studying Information Seeking and 
Use have been cut into the Table of Contents.]

Editorial

1191
IN THIS ISSUE
Bert R. Boyce
Published Online: 26 Nov 2002

Research Article
1192-1209
  Co-Evolution of User and Organizational Interfaces: a Longitudinal Case 
Study of Www Dissemination of National Statistics
Gary Marchionini
Published Online: 15 Nov 2002
         Marchionini posits that an organization's culture and its public 
face interact with the interfaces that the organization creates for 
communicating with its users; an interaction that results in the 
modification and evolution of the organization itself. This conclusion is 
the result of the analysis of 5 years of interviews with the U.S. Bureau of 
Labor Statistics staff and of transaction logs collected for the purpose of 
improving user interfaces for the Web sites of that Bureau. Internet 
services have become a part of the BLS infrastructure rather than an add-on 
dissemination service. Significant resources have been applied to Internet 
dissemination and a long-term development plan based on collected data 
exists, which has led to the regular addition of new added services. More 
and more diverse users are appearing, including nonspecialists, and the 
Bureau has developed a goal of universal access.

1210-1215
Analysis of SciFinder Scholar and Web of Science Citation Searches
Katherine M. Whitley
Published Online: 15 Nov 2002
Whitley finds differences in Chemical Abstracts SciFinder Scholar and ISI's 
Web of Science coverage of chemist's citing references. Using what is 
termed a haphazard sample of 15 chemistry researchers at U.S. universities 
and a random sample of 15 from the author index of the American Chemical 
Society National Meeting & Exposition Program (April 7-11, 2002, Orlando, 
FL) she searched their works cited in each database in 1999, 2000, and 
2001. The average duplication rate is 60%. The average unique percentage 
for SFS is 23% and for WOS, 17%. Source journal titles appear in both of 
the coverage lists for the two indexes, so a sizable number of articles in 
both indexes are likely not being processed properly. Neither index alone 
will provide a comprehensive search.

1218-1222
Effective Methods for Studying Information Seeking and Use
Barbara M. Wildemuth
Published Online: 15 Nov 2002
         In conjunction with the American Society for Information Science 
and Technology's (ASIST) annual meeting in fall 2001, the Special Interest 
Group on Information Needs, Seeking, and Use (SIG USE) sponsored a research 
symposium on Effective Methods for Studying Information Seeking and Use. 
The symposium was intended to address the SIG's goal of promoting studies 
of human information behavior by focusing on the research methods that can 
most effectively be used to study information needs, information seeking, 
information use, and other human information behaviors. The symposium 
included the presentation of six refereed articles, which were revised 
based on the discussion at the symposium and are included here. The six 
articles describe the application of a variety of research methods, singly 
or in combination. Some of the methods are most appropriate for studying 
individuals and their interactions with information, while others can be 
applied to studying group behaviors. The studies were conducted in a 
variety of settings, from a Web-searching laboratory to an archive, from 
hospitals to the great outdoors (i.e., forest and river sites). Each method 
or set of methods was applied to a particular user group, including young 
children, teenagers, and adults. Each article makes a unique contribution 
to our repertoire of research methods, as briefly reviewed here.
          The articles presented in this issue are a smorgasbord of some of 
the research methods currently being used for studying information needs, 
seeking, and use. They generated some interesting discussions during the 
SIG USE symposium, and provided those present with many ideas for 
furthering their own research programs. It is hoped that their long-term 
effect will be the strengthening of research efforts focused on 
understanding people's information needs, seeking, and use.

1223-1231
Methodology for a Project Examining Cognitive Categories for Library 
Information in Young Children
Linda Z. Cooper
Published Online: 15 Nov 2002
          Cooper's article ([2002]) is based on a study of children's 
understanding of libraries and the information they hold. The study 
involved three sessions with children in kindergarten through fourth grade. 
In the first session, the children were asked to visualize an empty library 
and to suggest the types of books that they felt would be important to 
include in the library. In the second session, the children were asked to 
imagine that the books they had suggested had been delivered and were piled 
on the floor. They were then asked to suggest ways in which the books might 
be sorted so that it would be easier to find a particular book. The group 
then practiced sorting a few of the terms generated in the first session 
onto shelves  in the imaginary library. In the third session, the children 
worked in small groups to complete a card(book)-sorting exercise, as 
practiced in the second session. After completing the sorting task, each 
group also named each shelf.  Multidimensional scaling and hierarchical 
clustering techniques were used to analyze the results of the card-sorting 
exercise. Although prior studies of information seeking (e.g., Bilal, 
[2000], [2001]; Borgman, Hirsch, Walter, & Gallagher, [1995]; Large, 
Beheshti, & Breuleux, [1998]; Pejtersen, [1992]; Solomon, [1993]) have 
included young children as study participants, they typically have focused 
on individual children interacting with existing information resources. 
Using visualization techniques and drawing on children's imaginative 
capabilities, Cooper has provided an example of how researchers can work 
with groups of young children to understand their perspectives on libraries 
and how library resources might be organized. In addition, the card-sorting 
exercise that Cooper designed for the children took into account their 
cognitive development (and how it changes between kindergarten and fourth 
grade) and, by having them work in groups, the individual idiosyncracies 
that might weaken the reliability of the findings. Although these methods 
would benefit from further development, they provide a basis for future 
work with young children.

1232-1238
“I Spent 1 ½ Hours Sifting Through One Large Box....”: Diaries as 
Information Behavior of the Archives User: Lessons Learned
Elaine G. Toms, Wendy Duff
Published Online: 15 Nov 2002
         Toms and Duff ([2002]) describe their use of diaries to 
investigate historians' use of archives. They cite the use of diaries as a 
data collection method in information and library science, and diaries have 
also been used in studies of human-computer interaction (e.g., Brown, 
Sellen, & O'Hara, [2000]). In the diary, an individual is asked to record 
his or her public and private thoughts in a particular situation, for 
example, while accessing and using archival materials. In this study, 
graduate students in history were asked to make diary entries recording 
which tools were used and why, how those tools were used, and whether they 
were helpful. Diaries hold great promise for some studies of information 
seeking and use because study participants record their thoughts 
concurrently with the information interactions. Thus, the diary entries can 
act as a surrogate for direct observation of these interactions. Archives 
use would seem to be an appropriate setting for this research method, 
because it is unlikely that the researcher could travel with the study 
participant to directly observe his or her information- seeking behaviors. 
However, Toms and Duff found that there are many barriers to using this 
research method. The chief problem is the burden imposed on the research 
participants and, because of the burden, their lack of compliance with the 
request to complete diary entries. Although diary entries may be a rich 
source of data, collecting them continues to be a challenge for the researcher.

1239-1244
Beyond Logs and Surveys: In-depth Measures of People's Web Use Skills
Eszter Hargittai
Published Online: 15 Nov 2002
         Web searching and the strategies that people use in their Web 
searches is a topic of great interest in information science. A number of 
studies have used Web transaction logs to gain insight into searchers' 
behaviors (e.g., Jansen, [2000]; Rieh & Xie, [2001]; Spink, Jansen, & 
Ozmultu, [2000]). Alternatively, researchers have surveyed Web users about 
their searching behaviors (e.g., Lenhart, [2000]; Spink, Bateman, & Jansen, 
[1999]). Hargittai ([2002]) provides an example of a large-scale laboratory 
study of searching behaviors. In the summer of 2001, a random sample of 
citizens of one New Jersey county were invited to participate in the study 
(additional counties will be added to the study in the future). The 
participants were interviewed about their Web use and knowledge about the 
Web, then observed as they completed 17 assigned search tasks. During the 
session, participants were asked to comment on their search behaviors. Each 
session was captured via audiotape and screen capture. During the summer of 
2001, 63 participants completed the study. In many ways, Hargittai's 
([2002]) work resembles earlier studies of Web searching. Having people 
complete assigned search tasks while being observed is standard practice in 
laboratory studies of searching behaviors (e.g., see Dempsey, Vreeland, 
Sumner, Yang, [2000]; Palmquist & Kim, [2000]). Capturing the searchers' 
comments as they search is less common, but has been done in previous 
studies (e.g., Fidel et al., [1999]; Wang, Hawk, & Tenopir, [2000]). The 
unique contribution of Hargittai's work is its scale: she is asking a large 
number of participants to complete and comment on a large number of search 
tasks. Incorporating the research and methodological perspectives of 
sociology into her design of this study, Hargittai is demonstrating that it 
is feasible to conduct such large-scale studies of searching behavior.

1245-1250
  Following Experts at Work in Their Own Information Spaces: Using 
Observational Methods to Develop Tools for the Digital Library
Paul Gorman, Mary Lavelle, Lois Delcambre, David Maier
Published Online: 15 Nov 2002
         The work of Gorman, Lavelle, Delcambre, and Maier ([2002]) was 
conducted in several phases, with each phase focused on a different 
conceptualization of the way in which physicians use medical records. Their 
initial focus was on the ways in which physicians familiarized  themselves 
with the content of a patient's medical record. The researchers observed 
physicians and asked them to think aloud as the physicians used a medical 
record to solve a clinical problem. Based on the outcomes of this phase, 
the next phase focused on capturing traces  left by experts as they 
examined the medical records. Pilot observations were conducted in multiple 
health care settings, followed by more in- depth ethnographic observation 
in an intensive care unit. Based on these observations, the team of 
researchers began to focus on the bundles  of information selected, 
organized, and annotated as the physicians worked with the medical records. 
Focus groups were used to verify that this conceptualization of information 
use by physicians was valid. This study helps us to understand how 
different research methods might serve different roles during the course of 
a study or series of studies. In each phase, the research team began with a 
particular conceptualization of the information behavior they were 
studying. However, the results in each phase caused the research team to 
adjust their view, each time bringing it closer to the view of the target 
audience - physicians. The most effort was put into the second phase. Thus, 
the first phase can be seen as preliminary, providing a first view of the 
situation of interest. The second phase was the primary study, with some 
pilot observations conducted in preparation for the intensive ethnographic 
observations that yielded the richest data. The final phase provided a 
mechanism for confirming the validity of the phase two findings, for a 
broader range of physicians. This serial combination of methods provides a 
strong basis for design of tools for working with medical records.

1251-1258
  Complementary User-centered Methodologies for Information Seeking and 
Use: System's Design in the Biological Information Browsing Environment (BIBE)
P. Bryan Heidorn, Bharat Mehra, Mary F. Lokhaiser
Published Online: 15 Nov 2002
          The work of Heidorn, Mehra, and Lokhaiser ([2002]) goes even 
further in incorporating multiple methods, by integrating findings from 
interviews, participant observation, field observation, and focus groups to 
study the information needs and information seeking of groups of high 
school students conducting biodiversity surveys. Interviews were conducted 
with botanists and with the students' teachers. The researchers 
participated in training for conducting biodiversity surveys and so were 
participants as well as being observers of the experiences of the other 
study participants. Students and their teachers were observed while 
actually conducting biodiversity surveys in the field (and I do mean, the 
field!). Finally, focus group interviews were conducted with small groups 
of students, asking about their experiences with the biodiversity survey 
and gathering their input about a new software tool for identifying 
particular plants. In contrast to the work of Gorman and his colleagues 
([2002]), Heidorn et al. ([2002]) use these methods in a single phase, 
allowing them to both triangulate data points for validation purposes and 
enrich their understanding of information seeking and use in this context. 
Clearly, none of these methods is unique to this study. Thus, the 
contribution of this study is its weaving together of methods selected to 
complement each other in terms of the perspectives they provide. The 
interviews with botanists provided outside experts' views of the process of 
plant identification - essentially a knowledge elicitation process that was 
useful in developing tools for nonexperts. The interviews with students and 
teachers (both individual and group) allowed them to speak about their 
experiences in trying to identify particular plants and the tools that 
supported that process. Participating in the training sessions provided the 
researchers with a first-person perspective on the knowledge that study 
participants might have as they entered the field to conduct a biodiversity 
survey. Direct observation in the field helped the researchers to 
understand the actual (as opposed to reported) use of the students' 
knowledge and the available tools. These methods are well-integrated, yet 
each provides some new insights for the researchers - in the authors' 
words, they are complementary to each other.

1259-1266
  Scenarios in the Afya Project as a Participatory Action Research (PAR) 
Tool for Studying Information Seeking and Use Across the “Digital Divide”
Bharat Mehra, Ann Peterson Bishop, Imani Bazzell, Cynthia Smith
Published Online: 15 Nov 2002
         Although all of the studies included here might be described as 
user-centered, the Afya project, described by Mehra, Bishop, Bazzell, and 
Smith ([2002]), is the only study that explicitly includes the target 
audience in the design of the research (thus making it participatory 
research). In addition, it is action research, in which findings are 
quickly incorporated into day-to-day project operations. The project's goal 
is to gain a better understanding of the provision of community health and 
information services for Black women, and to intervene effectively in this 
process. This article is focused on the use of scenarios  as one method for 
accomplishing this goal. The use of scenarios is common in the field of 
human-computer interaction and interface design (Carroll, [2000]). 
Scenarios are stories; they can be either factual or fictional, but they 
are always realistic. Within the context of this study, scenarios were 
generated by analyzing the discussions that occurred in three focus groups. 
Each scenario is a narrative that includes key social realities of the 
project participants, specific instances of local Black women's health 
experiences, and questions that mirror their information needs. Although 
participatory design is an approach sometimes used in information science 
(Schuler & Namioka, [1993]), participatory action research is relatively 
rare. It requires that the researchers and their study participants 
establish a relationship of trust, so that they can together formulate the 
goals of the research project. In this regard, the Afya project has been 
successful. On this basis, they are able to give a voice to the project 
participants - a group that is typically disempowered. With this voice, the 
project participants can tell their stories, generating scenarios that can 
then be used in making decisions in the design of information sources and 
services needed by the participants. The proactive nature of action 
research combined with an iterative approach to design supports this 
approach, helping the participants to maintain the trusting relationships 
required for the research to succeed.

Brief Communication
1267-1270
Banking (On) Different Forms of Symbolic Capital
Blaise Cronin, Debora Shaw
Published Online: 7 Nov 2002
         Using the 25 most cited Library and Information Science professors 
in Budd's study of faculty productivity, Cronin and Shaw gathered their 
total Web hits on Google, and total
mentions in open media using LexisNexis, in an attempt to determine if this 
group constituted
public intellectuals in Posner's sense. All have Web presence (123 to 
18,520) but nine do not appear in the public media (0 to 310). Web hits and 
media mentions are highly correlated, while the correlations of these two 
measures with citation counts are .69 and .66, respectively. While it 
appears Hal Varian might qualify, it seems there are no outstanding public 
intellectuals in the group.

Book Review
1271-1272
Digital Preservation and Metadata: History, Theory, Practice, by Susan S. 
Lazinger
Derek G. Law
Published Online: 6 Nov 2002

Letter to the Editor
1273-1275
Engineering a Search Engine (WebLib) and Browser (Knowledge Navigator) for 
Digital Libraries: Global Knowledge Discovery Tools Exclusively for 
Librarians and Libraries on the Web
V. Sreenivasulu
Published Online: 7 Nov 2002

1275-1276
The Special Competency of Information Specialists
Birger Hjorland
Published Online: 7 Nov 2002

1276
Integer Partitions Result in Skewed Rank-Frequency Distributions
Donald A. Windsor
Published Online: 7 Nov 2002

1277
Erratum
Published Online: 5 Nov 2002

------------------------------------------------------
The ASIST home page <http://www.asis.org> contains the Table of Contents 
and brief abstracts as above from January 1993 (Volume 44) to date.

The John Wiley Interscience site <http://www.interscience.wiley.com> 
includes issues from 1986 (Volume 37) to date.  Guests have access only to 
tables of contents and abstracts.  Registered users of the interscience 
site have access to the full text of these issues and to preprints.

Executive Director
American Society for Information Science and Technology
1320 Fenwick Lane, Suite 510
Silver Spring, MD  20910
FAX: (301) 495-0810
PHONE: (301) 495-0900

http://www.asis.org




More information about the Asis-l mailing list