{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:40:03Z","timestamp":1761007203330,"version":"build-2065373602"},"reference-count":19,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2015,4,24]],"date-time":"2015-04-24T00:00:00Z","timestamp":1429833600000},"content-version":"vor","delay-in-days":478,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2014,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title><jats:p>Three months of clickstream transaction log data for an image\u2010based digital library were analyzed for patterns in user session behavior. After extensive log cleaning of the data files, k\u2010means cluster analysis was applied using selected session\u2010related statistics. The outcomes reveal largely uniform session behaviors (97.37%) consisting of a limited number of actions, with a higher number of queries than other session types, but little browsing of individual results. Given the specialized nature of the digital collections within the studied system, most searchers appear to engage in purposeful, directed searching. The remaining session clusters represent higher degrees of browsing over a longer time with fewer queries per session. The session behaviors for this environment are markedly different than those revealed by transaction log studies of other information retrieval environments.<\/jats:p>","DOI":"10.1002\/meet.2014.14505101082","type":"journal-article","created":{"date-parts":[[2015,4,24]],"date-time":"2015-04-24T17:19:02Z","timestamp":1429895942000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Identifying search patterns in an image\u2010based digital library"],"prefix":"10.1002","volume":"51","author":[{"given":"Hyejung","family":"Han","sequence":"first","affiliation":[{"name":"University of Wisconsin\u2010Milwaukee"}]},{"given":"Dietmar","family":"Wolfram","sequence":"additional","affiliation":[{"name":"University of Wisconsin\u2010Milwaukee"}]}],"member":"311","published-online":{"date-parts":[[2015,4,24]]},"reference":[{"key":"e_1_2_6_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-011-0228-8"},{"key":"e_1_2_6_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33999-8_40"},{"key":"e_1_2_6_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.1159"},{"key":"e_1_2_6_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-007-9028-7"},{"key":"e_1_2_6_6_1","unstructured":"He D. &G\u00f6ker A.(2000).Detecting session boundaries from web user logs. InProceedings of the BCS\u2010IRSG 22nd annual colloquium on information retrieval research(pp.57\u201366)."},{"key":"e_1_2_6_7_1","doi-asserted-by":"publisher","DOI":"10.1108\/00220410810844169"},{"key":"e_1_2_6_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s007999900022"},{"key":"e_1_2_6_9_1","doi-asserted-by":"publisher","DOI":"10.1108\/10662241011084112"},{"key":"e_1_2_6_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1121949.1121979"},{"key":"e_1_2_6_11_1","doi-asserted-by":"publisher","DOI":"10.1108\/07378831311303976"},{"key":"e_1_2_6_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lisr.2005.01.013"},{"issue":"1","key":"e_1_2_6_13_1","first-page":"9","article-title":"Query management techniques and their impact in digital libraries","volume":"3","author":"Shiri A.","year":"2011","journal-title":"International Journal of Information"},{"key":"e_1_2_6_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551507084140"},{"key":"e_1_2_6_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45747-X_41"},{"key":"e_1_2_6_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4571(2000)9999:9999<::AID-ASI1591>3.0.CO;2-R"},{"key":"e_1_2_6_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20931"},{"key":"e_1_2_6_18_1","unstructured":"Trieschnigg D. Nguyen D. &Meder T.(2013).In search of Cinderella: A transaction log analysis of folktale searchers. In theProceedings of the First Workshop on the Exploration Navigation and Retrieval of Information in Cultural Heritage 36th Annual ACM SIGIR Conference SIGIR2013 Dublin Ireland. August 1st 2013."},{"key":"e_1_2_6_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21034"},{"issue":"3","key":"e_1_2_6_20_1","first-page":"103","article-title":"Teaching analytics: A clustering and triangulation study of digital library user data","volume":"15","author":"Xu B.","year":"2012","journal-title":"Educational Technology & Society"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2014.14505101082","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2014.14505101082","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.2014.14505101082","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T12:00:28Z","timestamp":1760961628000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.2014.14505101082"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["10.1002\/meet.2014.14505101082"],"URL":"https:\/\/doi.org\/10.1002\/meet.2014.14505101082","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2014,1]]}}}