5 research outputs found

    A New Model for Increasing Information Access and Literacy in the Global South

    Get PDF
    Rapid advances in technology infrastructure and increasing access to constant connectivity are paving the way for more innovative methods to support knowledge sharing in Global South countries. We present a model for knowledge sharing that is open, interactive, draws on diverse expertise and experience, and builds a searchable information repository that can be used by multiple communities and organizations. In addition, we envision that this model can be an effective and low-cost stepping stone to improved information literacy across the developing world.ye

    The Archive Query Log: Mining Millions of Search Result Pages of Hundreds of Search Engines from 25 Years of Web Archives

    Full text link
    The Archive Query Log (AQL) is a previously unused, comprehensive query log collected at the Internet Archive over the last 25 years. Its first version includes 356 million queries, 166 million search result pages, and 1.7 billion search results across 550 search providers. Although many query logs have been studied in the literature, the search providers that own them generally do not publish their logs to protect user privacy and vital business data. Of the few query logs publicly available, none combines size, scope, and diversity. The AQL is the first to do so, enabling research on new retrieval models and (diachronic) search engine analyses. Provided in a privacy-preserving manner, it promotes open research as well as more transparency and accountability in the search industry.Comment: SIGIR 2023 resource paper, 13 page

    Internet Searching in Children and Adolescents: A Longitudinal Framework of Youth Search Roles

    Get PDF
    The current landscape of literature investigating youth Internet searching focuses mainly on how youth search in classrooms or libraries at a single point in time and highlights problems youth encounter, rather than taking an expansive view of the entire search process. This research uses a framework of searching roles, or patterns of search behavior, to provide a complete picture of how youth behave as searchers in the home environment. The searching behavior of the youth participating in this research is examined by viewing the whole searcher, where search problems are important, but equally important are factors such as affect, context, and the process of search. This longitudinal study examined participants at ages 7, 9, and 11 in 2008 to 2009 and again at ages 10 to 15 in 2012 to 2013. The searching behaviors displayed during the study's in-home interviews were analyzed according to qualitative methods that evolved throughout the research. Results of the research provide a comprehensive picture of how youth search roles and search behaviors change over time, and through case study analysis of selected participants. The research also provides in-depth description of how individuals change as searchers over time. Additionally provided is a graphic to summarize the main characteristics of search roles in youth searchers. This research concludes with recommendations to adult stakeholders such as teachers, librarians, search engine designers, researchers, and parents to aid in promoting search literacy for youth

    Analysis of an Expert Search Query Log

    No full text
    Expert search has made rapid progress in modeling, algorithms and evaluations in the recent years. However, there is very few work on analyzing how users interact with expert search systems. In this paper, we conduct analysis of an expert search query log. The aim is to understand the special characteristics of expert search usage. To the best of our knowledge, this is one of the earliest work on expert search query log analysis. We find that expert search users generally issue shorter queries, more common queries, and use more advanced search features, with fewer queries in a session, than general Web search users do. This study explores a new research direction in expert search by analyzing and exploiting query logs
    corecore