{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T23:36:20Z","timestamp":1769816180185,"version":"3.49.0"},"reference-count":41,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":296,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["asistdl.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Proc. Assoc. Info. Sci. Tech."],"published-print":{"date-parts":[[2017,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title><jats:p>Existing research into serendipitous information encountering has focused on how people stumble upon information, rather than how they create value from the information encountered. This online diary study with follow\u2010up interviews provides an enriched understanding of the subjective value of information encounters and the motivators, barriers and actions involved in creating value from them. We leverage our findings to generate design suggestions for digital information tools aimed at assisting in creating value from encountered information.<\/jats:p>","DOI":"10.1002\/pra2.2017.14505401031","type":"journal-article","created":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T03:35:36Z","timestamp":1508816136000},"page":"279-288","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["After serendipity strikes: Creating value from encountered information"],"prefix":"10.1002","volume":"54","author":[{"given":"Stephann","family":"Makri","sequence":"first","affiliation":[{"name":"City University of London  UK"}]},{"given":"Mina","family":"Ravem","sequence":"additional","affiliation":[{"name":"Telia Norge AS  Norway"}]},{"given":"Dana","family":"McKay","sequence":"additional","affiliation":[{"name":"University of Melbourne  Australia"}]}],"member":"311","published-online":{"date-parts":[[2017,10,24]]},"reference":[{"issue":"3","key":"e_1_2_8_2_1","article-title":"Towards a definition of serendipity in information behaviour","volume":"20","author":"Agarwal N. K.","year":"2015","journal-title":"Information Research"},{"key":"e_1_2_8_3_1","volume-title":"Modern information retrieval","author":"Baeza\u2010Yates R.","year":"1999"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199404)45:3<149::AID-ASI5>3.0.CO;2-J"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb024320"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199607)47:7<493::AID-ASI3>3.0.CO;2-P"},{"key":"e_1_2_8_7_1","doi-asserted-by":"crossref","unstructured":"Carter S. &Mankoff J.(2005).When participants do the capturing: The role of media in diary studies. In ProcCHI 98 Portland Oregon USA.899\u2013908. doi:10.1145\/1054972.1055098","DOI":"10.1145\/1054972.1055098"},{"key":"e_1_2_8_8_1","first-page":"115","volume-title":"New infotainment technologies in the home: Demand\u2010side perspectives","author":"Cermak G. W.","year":"1996"},{"key":"e_1_2_8_9_1","volume-title":"Basics of qualitative research","author":"Corbin J.","year":"2015"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.emj.2010.07.001"},{"key":"e_1_2_8_11_1","doi-asserted-by":"crossref","unstructured":"D'Antonio L. Makri S. &Blandford A.(2012). Coming across academic social media content serendipitously.ASIST Proceedings 49(1) 1\u201310. doi:10.1002\/meet.14504901002","DOI":"10.1002\/meet.14504901002"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/016555158901500406"},{"key":"e_1_2_8_13_1","unstructured":"Erdelez S.(1997).Information encountering: A conceptual framework for accidental information discovery. In ProcISIC 97 Tampere Finland.412\u2013421."},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2004.02.002"},{"key":"e_1_2_8_15_1","first-page":"179","volume-title":"Theories of information behavior","author":"Erdelez S.","year":"2005"},{"key":"e_1_2_8_16_1","first-page":"219","article-title":"Sharing information encountered for others on the web","volume":"1","author":"Erdelez S.","year":"2000","journal-title":"New Rev. Inf. Behav. Res"},{"issue":"3","key":"e_1_2_8_17_1","first-page":"219","article-title":"Qualitative methods in information retrieval research","volume":"15","author":"Fidel R.","year":"1993","journal-title":"Lib Inf Sci Res"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1108\/00220410310472518"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lisr.2006.03.022"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.01.003"},{"key":"e_1_2_8_21_1","doi-asserted-by":"crossref","unstructured":"Kleiner E. R\u00e4dle R. &Reiterer H.(2013).Blended shelf: Reality\u2010based presentation and exploration of library collections. In proc. ACM SIGCHI 13 Paris France.577\u2013582. doi:10.1145\/2468356.2468458","DOI":"10.1145\/2468356.2468458"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199106)42:5<361::AID-ASI6>3.0.CO;2-#"},{"key":"e_1_2_8_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41057-4_10"},{"key":"e_1_2_8_24_1","doi-asserted-by":"crossref","unstructured":"Makri S. Bhuiya J. Carthy J. &Owusu\u2010Bonsu J.(2015). Observing serendipity in digital information environments.ASIST Proceedings 52(1) 1\u201310. doi:10.1002\/pra2.2015.145052010019","DOI":"10.1002\/pra2.2015.145052010019"},{"key":"e_1_2_8_25_1","doi-asserted-by":"publisher","DOI":"10.1108\/00220411211256030"},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.1108\/00220411211256049"},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2007.05.001"},{"key":"e_1_2_8_28_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23200"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21338"},{"key":"e_1_2_8_30_1","volume-title":"Information seeking in electronic environments","author":"Marchionini G.","year":"1997"},{"key":"e_1_2_8_31_1","doi-asserted-by":"crossref","unstructured":"McBirnie A.(2008). Seeking serendipity: The paradox of control.Aslib Proceedings 60(6) 600\u2013618. doi:10.1108\/00012530810924294","DOI":"10.1108\/00012530810924294"},{"issue":"4","key":"e_1_2_8_32_1","first-page":"391","article-title":"Examination of relationships among serendipity, the environment, and individual differences","volume":"51","author":"McCay\u2010Peet L.","year":"2015","journal-title":"IP&M"},{"issue":"7","key":"e_1_2_8_33_1","first-page":"1463","article-title":"Investigating serendipity: How it unfolds and what may influence it","volume":"66","author":"McCay\u2010Peet L.","year":"2015","journal-title":"JASIST"},{"key":"e_1_2_8_34_1","doi-asserted-by":"publisher","DOI":"10.1108\/00220410310457993"},{"key":"e_1_2_8_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10244"},{"key":"e_1_2_8_36_1","first-page":"175","volume-title":"Strategic management in the 21st century","author":"Napier N. K.","year":"2013"},{"key":"e_1_2_8_37_1","volume-title":"\u201cvaluable, adj. and n.\u201d","author":"Oxford English Dictionary."},{"key":"e_1_2_8_38_1","doi-asserted-by":"crossref","unstructured":"Pearce J. &Chang S.(2014). Exploration without keywords: The bookfish case. Inproc. OzCHI 2014 Sydney Australia.76\u201379. doi:10.1145\/2686612.2686639","DOI":"10.1145\/2686612.2686639"},{"key":"e_1_2_8_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lisr.2005.11.001"},{"issue":"3","key":"e_1_2_8_40_1","article-title":"A user\u2010centred mobile diary study approach to understanding serendipity in information research","volume":"16","author":"Sun X.","year":"2011","journal-title":"Information Research"},{"key":"e_1_2_8_41_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/3828.001.0001"},{"key":"e_1_2_8_42_1","doi-asserted-by":"crossref","unstructured":"Thudt A. Hinrichs U. &Carpendale S.(2012).The bohemian bookshelf: Supporting serendipitous book discoveries through information visualization. In proc. ACM SIGCHI Austin TX.1461\u20131470. doi:10.1145\/2207676.2208607","DOI":"10.1145\/2207676.2208607"}],"container-title":["Proceedings of the Association for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fpra2.2017.14505401031","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/pra2.2017.14505401031","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/pra2.2017.14505401031","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/pra2.2017.14505401031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T16:26:38Z","timestamp":1761063998000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/pra2.2017.14505401031"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["10.1002\/pra2.2017.14505401031"],"URL":"https:\/\/doi.org\/10.1002\/pra2.2017.14505401031","archive":["Portico"],"relation":{},"ISSN":["2373-9231","2373-9231"],"issn-type":[{"value":"2373-9231","type":"print"},{"value":"2373-9231","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1]]},"assertion":[{"value":"2017-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}