Visualizing Information-Triage

Author(s):  
Liese Zahabi

In many ways, the promise of the Internet has been overshadowed by a sense of information overload and anxiety for many users. The production and publication of online material has become increasingly accessible and affordable, creating a confusing glut of information users must sift through to locate exactly what they want or need. Even a fundamental Google search can often prove paralyzing. In this chapter, the author examines the points at which design plays a role in the online search process, reconciles those points with the nature of sensemaking and the limitations of working memory, and suggests ways to support users with an information-triage system. The author then describes a speculative online searching prototype that explores these issues and the possibilities for information-triage.

Author(s):  
Brenda Carter

The internet is often students’ first choice when researching school assignments; however students’ online search strategies typically consist of a basic Google search and Wikipedia. The creation of library intranet pages providing a range of search tools and the teaching of customised information literacy lessons aim to better utilise library resources and improve students’ research skills and learning outcomes.


2019 ◽  
Vol 70 ◽  
pp. 01013
Author(s):  
Vladimir Panferov ◽  
Anastasia Miklyaeva ◽  
Svetlana Bezgodova ◽  
Artem Ivanov

The paper presents the results of experimental study of students’ information searching strategies on the Internet. The study was aimed to analyze the relationship between university students’ strategies of information Internet search for educational tasks and style characteristics of their cognitive activities (styles of information coding, styles of information processing and styles of cognitive regulation). The study was based on the Level model of cognitive-style characteristics (Kholodnaya, 2002). Main methods of study were experimental modelling of educational situations and testing for assessment of students’ styles of information coding, information processing and cognitive regulation. The results of experimental study allowed to identify two strategies of educational online searching (“direct online searching” and “improving online searching”) and their relationship with students’ cognitive characteristics and academic achievements: students’ strategies of educational online search are determined primarily by the characteristics of cognitive regulation. The results did not reveal a direct link between strategies educational online search and academic achievement.


2016 ◽  
Vol 2 (3) ◽  
pp. 542
Author(s):  
Belal Al-Khateeb ◽  
Ali J. Hilal ◽  
Sufyan T. Al-Janabi

Search on the internet is a very important process for most people as many people use search engines to do research, obtain scientific documents, browse social networks (such as Facebook, twitter, etc.), email, etc. The user's ability to find useful information by using the right keywords in the query is considered as the main challenge in the search process. Sometimes, the user uses keywords that have more than one meaning where every meaning has more than one keyword to describe it. The proposed system aims to select the right meaning of the keywords and expanding the query to other keywords that have same meaning using WordNet. After the query expansion is done, Google search engine is used to do the search. The obtained results are promising, opening further research directions for enhancing the search process.


BMC Neurology ◽  
2021 ◽  
Vol 21 (1) ◽  
Author(s):  
John Angelo Luigi S. Perez ◽  
Adrian I. Espiritu ◽  
Roland Dominic G. Jamora

Abstract Background The internet has made significant contributions towards health education. Analyzing the pattern of online behavior regarding meningitis and vaccinations may be worthwhile. It is hypothesized that the online search patterns in meningitis are correlated with its number of cases and the search patterns of its related vaccines. Methods This was an infodemiological study that determined the relationship among online search interest in meningitis, its worldwide number of cases and its associated vaccines. Using Google Trends™ Search Volume Indices (SVIs), we evaluated the search queries “meningitis,” “pneumococcal vaccine,” “BCG vaccine,” “meningococcal vaccine” and “influenza vaccine” in January 2021, covering January 2008 to December 2020. Spearman rank correlation was used to determine correlations between these queries. Results The worldwide search interest in meningitis from 2008 to 2020 showed an average SVI of 46 ± 8.8. The most searched topics were symptoms, vaccines, and infectious agents with SVIs of 100, 52, and 39, respectively. The top three countries with the highest search interest were Ghana, Kazakhstan, and Kenya. There were weak, but statistically significant correlations between meningitis and the BCG (ρ = 0.369, p < 0.001) and meningococcal (ρ = 0.183, p < 0.05) vaccines. There were no statistically significant associations between the number of cases, influenza vaccine, and pneumococcal vaccine. Conclusion The relationships among the Google SVIs for meningitis and its related vaccines and number of cases data were inconsistent and remained unclear. Future infodemiological studies may expand their scopes to social media, semantics, and big data for more robust conclusions.


2003 ◽  
Vol 8 (4) ◽  
pp. 897-902 ◽  
Author(s):  
Carlos Eduardo Siqueira ◽  
Fernando Carvalho

This article reviews the scope of several Observatories found by a search in the Internet through the Google search engine. After examining these observatories, it describes the aims and initial accomplishments of the Observatory of the Americas as a network of professionals and activists from different countries in the Americas. The article concludes with a discussion of the pattern identified among these observatories: they may be clearinghouses or networks, or both.


2008 ◽  
Vol 67 (1) ◽  
pp. 69-91 ◽  
Author(s):  
Arthur Chaskalson

There are two themes that recur in previous Sir David Williams lectures. First, that it is a considerable honour to be invited to give the lecture. Secondly, that it is a daunting task to do so in the presence of Sir David, particularly in a field in which he has expertise. Since that covers most of the law there is no escape from this dilemma. Let me then acknowledge the privilege of having been asked to give this year's lecture, and confess that it is with some trepidation that I do so. The subject, terrorism and human rights, is not exactly uncharted territory. When I looked into the internet for some guidance on what might be relevant to terrorism and human rights, the response to my Google search informed me that in .03 seconds 32,900,000 references had been found. This seemed to indicate that it was unlikely that I would be able to say anything that has not already been said. But there are some subjects that are of such importance that there is value in reminding ourselves of the issues that are at stake, and if necessary for that purpose, repeating what others have said. And it is with that in mind that I approach my chosen topic.


2016 ◽  
Vol 12 (3) ◽  
pp. 21-36 ◽  
Author(s):  
Rui Pedro Lourenço

Data portals are being created as part of open government strategies to increase transparency. But although the potential of the internet to increase transparency (as data disclosure) has been widely considered in the literature, there is no reported evidence of any of the released data actually being used by their ultimate recipients (citizens) for public accountability purposes. This descriptive research effort aims to find evidence of the impact of open government portals, asserting whether data is indeed being used and for what purposes. One contract portal was selected and Google Search was used to find portal references on the internet. A qualitative content analysis approach was adopted, whereby references were examined with respect to its main purpose and data usage. Evidence was found of contract data being used, among others, to identify possible situations of corruption, nepotism and misusage of public resources, support argumentation on public policy debates and, in general, to hold public officials accountable in the public sphere through ‘blame and shame' sanctions.


2019 ◽  
Vol 8 (1) ◽  
pp. 562
Author(s):  
Yuni Rahmah ◽  
Elva Rahmah

AbstractIn this paper the language about Millennial Generation Information Search Behavior To Meet Information Needs. This study aims to describe the information seeking behavior of the millennial generation to meet the information needs of this study at the Padang State University. Data were collected through observation and distribution of questionnaires with students of the Indonesian and Regional Languages and Literature Department at Padang State University. Analyzing the data, concluded the following matters. (1). Starting - consists of activities that initiate information seeking activities. In general (100%) determine the topic especially before conducting an information search, in general (90%) conduct information search after discussion or consultation with lecturers, in general (95.23%) know the information needs when attending lectures, (88.4 %) know the information needs specifically, and in general (88%) do information when they are aware of and know the need for information. (2). Chaining - activities following a series of citations, citations or forms of reconciliation between documents with each other. In general (92.8 uses a bibliography to search information, generally (90.4%) use the author's name from the core reference to look for other references in conducting information searches, and in general (92.9%) use subjects from core reference to look for other references (3) Browsing - merawak, looking for, but rather directed, in areas that are considered to have the potential for the information needed.In general (73%) libraries can always meet information needs, in general In general (95.2%) look for information on the internet if the information you are looking for is not found in the printed source of information, (92.8%) generally directly looking for information on the internet if the information you need is not found in the printed source of information, at generally (45.22%) query identification (keywords). (4). Differentiating - sorting, using the features in the information source as a basic reference for checking quality or information content. in general (88%) the internet is the main source of information, in general (92.84%) The source of information printed is still very much needed in fulfilling information needs. (5). Monitoring - monitoring progress by focusing on selected sources. In general (88.09%) looked for the latest information through the internet by searching for the latest articles, in general (78.56%) needed to find the latest information to enrich the reference sources. (6). Extracting - systematically digging in one source to retrieve information that is considered important. In general (90.47 when you need information you often search the search engine (google, yahoo), in general (88.09 often uses a journal database to get information, in general (78.56%) after getting information on the internet , you directly copy the information, in general (76.19%) use the "Google" search engine because it is more relevant than other search engines.Keywords: behavior, millennial generation and information.


Stroke ◽  
2015 ◽  
Vol 46 (suppl_1) ◽  
Author(s):  
Vida Abedi ◽  
Marieme Mbaye ◽  
Georgios Tsivgoulis ◽  
Shailesh Male ◽  
Nitin Goyal ◽  
...  

Background &Purpose: In recent years, Internet became an increasingly important tool for accessing health information and is being used more frequently to promote public health. In this study, we used Google search data to explore information seeking behavior for transient ischemic attack (TIA). Methods: We selected two groups of keywords related to TIA -“Transient Ischemic Attack” and “Mini Stroke” - after examining several related search keywords. We obtained all available online search data performed in the United States from the Google search engine for a ten year span - January 2004 to December 2013. The monthly and daily search data for the selected keywords were analyzed - using a moving window strategy - to explore the trends, peaks and declining effects. Results: There were three significant concurrent peaks in the Google search data for the selected keywords. Each peak was directly associated with media coverage and news headlines related to the incident of TIA in a public figure. (Figure 1) Following each event, it took an average of two weeks for the search trend to return to its respective average value. The trend was steady for “Transient Ischemic Attack”; however, the search interest for the keyword “mini stroke” shows a steady increase. The overall search interest for the selected keywords was significantly higher in the southeastern United States. Conclusions: Our study shows that changes in online search behavior can be associated with media coverage of key events (in our case TIA) in public figures. These findings suggest that online health promotion campaigns might be more effective if increased promptly after similar media coverage.


Author(s):  
Paolo Massa

This chapter discusses the concept of trust and how trust is used and modeled in online systems currently available on the Web or on the Internet. It starts by describing the concept of information overload and introducing trust as a possible and powerful way to deal with it. It then provides a classification of the systems that currently use trust and, for each category, presents the most representative examples. In these systems, trust is considered as the judgment expressed by one user about another user, often directly and explicitly, sometimes indirectly through an evaluation of the artifacts produced by that user or his/her activity on the system. We hence use the term “trust” to indicate different types of social relationships between two users, such as friendship, appreciation, and interest. These trust relationships are used by the systems in order to infer some measure of importance about the different users and influence their visibility on the system. We conclude with an overview of the open and interesting challenges for online systems that use and model trust information.


Sign in / Sign up

Export Citation Format

Share Document