{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:47:28Z","timestamp":1774525648929,"version":"3.50.1"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,4,1]],"date-time":"2015-04-01T00:00:00Z","timestamp":1427846400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Law"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s10506-015-9165-y","type":"journal-article","created":{"date-parts":[[2015,4,2]],"date-time":"2015-04-02T15:07:41Z","timestamp":1427987261000},"page":"103-132","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A process model for information retrieval context learning and knowledge discovery"],"prefix":"10.1007","volume":"23","author":[{"given":"Harvey","family":"Hyman","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Terry","family":"Sincich","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rick","family":"Will","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Manish","family":"Agrawal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Balaji","family":"Padmanabhan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"suffix":"III","given":"Warren","family":"Fridy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,4,1]]},"reference":[{"issue":"1","key":"9165_CR1","first-page":"1","volume":"43","author":"TD Anderson","year":"2006","unstructured":"Anderson TD, Bates MJ, Berryman J, Erdelez S, Heinstrom J (2006) Designing for uncertainty. Proc Am Soc Inf Sci Technol 43(1):1","journal-title":"Proc Am Soc Inf Sci Technol"},{"key":"9165_CR2","unstructured":"Attfield S, Blandford A (2008) E-discovery viewed as integrated human\u2013computer sensemaking: the challenge of \u2018frames\u2019. Second international workshop on supporting search and sensemaking for electronically stored information in discovery proceedings (DESI II, 2008)"},{"key":"9165_CR3","first-page":"397","volume":"3","author":"P Auer","year":"2002","unstructured":"Auer P (2002) Using confidence bounds for exploitation-exploration trade-offs. J Mach Learn Res 3:397","journal-title":"J Mach Learn Res"},{"key":"9165_CR4","volume-title":"A study in behavior","author":"SA Barnett","year":"1963","unstructured":"Barnett SA (1963) A study in behavior. Methuen, London"},{"key":"9165_CR5","unstructured":"Baron J (2005) Toward a federal benchmarking standard for evaluating information retrieval products used in e-discovery. Sedona Conf J 6(1):237\u2013246"},{"key":"9165_CR6","first-page":"201","volume":"40","author":"AG Barto","year":"1981","unstructured":"Barto AG, Sutton RS, Brouwer PS (1981) Associative search network: a reinforcement learning associative memory. IEEE Trans Syst Man Cybern 40:201\u2013211","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"9165_CR7","doi-asserted-by":"crossref","unstructured":"Bates MJ (1979) Information search tactics. J Am Soc Inf Sci 30(4):205\u2013214","DOI":"10.1002\/asi.4630300406"},{"key":"9165_CR8","doi-asserted-by":"crossref","unstructured":"Bates MJ (1986) Subject access in online catalogs: a design model. J Am Soc Inf Sci 37(6):357\u2013376","DOI":"10.1002\/(SICI)1097-4571(198611)37:6<357::AID-ASI1>3.0.CO;2-H"},{"key":"9165_CR9","doi-asserted-by":"crossref","unstructured":"Bates MJ (1989) The design of browsing and berry picking techniques for the online search interface. Online Rev 13(5):407\u2013424","DOI":"10.1108\/eb024320"},{"key":"9165_CR10","doi-asserted-by":"publisher","DOI":"10.1037\/11164-000","volume-title":"Conflict, arousal and curiosity","author":"DE Berlyne","year":"1960","unstructured":"Berlyne DE (1960) Conflict, arousal and curiosity. McGraw Hill, New York"},{"key":"9165_CR11","unstructured":"Berlyne DE (1963) Motivational problems raised by exploratory and epistemic behavior. In: Koch S (ed) Psychology: a study of science, vol 5. McGraw Hill, New York, pp 284\u2013364"},{"issue":"3","key":"9165_CR12","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1145\/3166.3197","volume":"28","author":"DC Blair","year":"1985","unstructured":"Blair DC, Maron ME (1985) An evaluation of retrieval effectiveness for a full-text document-retrieval system. Commun ACM 28(3):289\u2013299","journal-title":"Commun ACM"},{"key":"9165_CR13","doi-asserted-by":"crossref","unstructured":"Broder A (2002) A taxonomy of web search,\u201d IBM Research, SIGIR Forum, vol 36, no 2 (Fall, 2002)","DOI":"10.1145\/792550.792552"},{"key":"9165_CR14","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1016\/0169-7552(95)00043-7","volume":"27","author":"LD Catledge","year":"1995","unstructured":"Catledge LD, Pitkow JE (1995) Characterizing browsing strategies in the world-wide web. Comput Netw ISDN Syst 27:1065\u20131073","journal-title":"Comput Netw ISDN Syst"},{"issue":"4","key":"9165_CR15","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1002\/asi.21703","volume":"63","author":"G Chowdhury","year":"2012","unstructured":"Chowdhury G (2012) Building environmentally sustainable information services: a green is research agenda. J Am Soc Inf Sci Technol 63(4):633\u2013647","journal-title":"J Am Soc Inf Sci Technol"},{"key":"9165_CR16","unstructured":"Chowdhury CR, Bhuyan P (2010) Information retrieval using fuzzy c-means clustering and modified vector space model. In: Computer science and information technology (July, 2010)"},{"key":"9165_CR17","doi-asserted-by":"crossref","unstructured":"Cohen JD, McClure SM, Yu AJ (2007) Should I stay or should I go. In: Philosophical transactions: biological sciences, vol 362, no 1481, mental processes in the human brain (May, 2007), The Royal Society","DOI":"10.1098\/rstb.2007.2098"},{"key":"9165_CR65","doi-asserted-by":"crossref","unstructured":"Cormack GV, Mojdeh M (2009) Machine learning for information retrieval: TREC 2009 web, relevance feedback and legal tracks","DOI":"10.6028\/NIST.SP.500-278.legal-Waterloo"},{"issue":"1","key":"9165_CR18","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/0306-4573(88)90075-1","volume":"24","author":"JF Cove","year":"1988","unstructured":"Cove JF, Walsh BC (1988) Online text retrieval via browsing. Inf Process Manag 24(1):31\u201337","journal-title":"Inf Process Manag"},{"issue":"6","key":"9165_CR19","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1037\/0021-9010.86.6.1129","volume":"86","author":"S Debowski","year":"2001","unstructured":"Debowski S, Wood RE, Bandura A (2001) Impact of guided exploration and enactive exploration on self-regulatory mechanisms and information acquisition through electronic search. J Appl Psychol 86(6):1129","journal-title":"J Appl Psychol"},{"key":"9165_CR20","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"S Deerwester","year":"1990","unstructured":"Deerwester S, Dumais ST, Furnas GW, Landauer TK, Harshman R (1990) Indexing by latent semantic analysis. J Am Soc Inf Sci 41:391\u2013407","journal-title":"J Am Soc Inf Sci"},{"issue":"13\u201314","key":"9165_CR21","doi-asserted-by":"publisher","first-page":"1256","DOI":"10.1080\/0267257X.2010.524165","volume":"26","author":"C Demangeot","year":"2010","unstructured":"Demangeot C, Broderick AJ (2010) Exploration and its manifestations in the context of online shopping. J Mark Manag 26(13\u201314):1256\u20131278","journal-title":"J Mark Manag"},{"issue":"13","key":"9165_CR22","doi-asserted-by":"publisher","first-page":"1190","DOI":"10.1002\/1097-4571(2000)9999:9999<::AID-ASI1031>3.0.CO;2-B","volume":"51","author":"Y Ding","year":"2000","unstructured":"Ding Y, Chowdhury G, Foo S, Qian W (2000) Bibliometric information retrieval system (BIRS): a web search interface utilizing bibliometric research results. J Am Soc Inf Sci 51(13):1190\u20131204","journal-title":"J Am Soc Inf Sci"},{"key":"9165_CR23","unstructured":"Faisal S, Attfield S, Blandford A (2009) A classification of sensemaking representations, workshop on sensemaking, CHI, 2009"},{"key":"9165_CR24","first-page":"8","volume":"15","author":"GL Fordham","year":"2009","unstructured":"Fordham GL (2009) Using keyword search terms in e-discovery and how they relate to issues of responsiveness, privilege, evidence standards and rube goldberg. Richmond J Law Technol 15:8\u201313","journal-title":"Richmond J Law Technol"},{"key":"9165_CR25","unstructured":"Grossman MR, Cormack GV (2011) Technology-assisted review in e-discovery can be more effective and more efficient than exhaustive manual review. Richmond J Law Technol 17:11\u201316"},{"key":"9165_CR26","unstructured":"Grossman MR, Cormack GV (2013) The grossman-cormack glossary of technology-assisted review. Federal Courts Law Rev 7(1):1\u201334"},{"key":"9165_CR27","doi-asserted-by":"crossref","unstructured":"Grossman MR, Cormack GV (2014) Evaluation of machine-learning protocols for technology-assisted review in electronic discovery, SIGIR\u201914","DOI":"10.1145\/2600428.2609601"},{"issue":"11","key":"9165_CR28","doi-asserted-by":"publisher","first-page":"1440","DOI":"10.1002\/asi.20432","volume":"57","author":"J Heinstrom","year":"2006","unstructured":"Heinstrom J (2006) Broad exploration or precise specificity: two basic information seeking patterns among students. J Am Soc Inf Sci Technol 57(11):1440\u20131450","journal-title":"J Am Soc Inf Sci Technol"},{"key":"9165_CR29","unstructured":"Hernandez R, Kocieniewski D (2009) As new lawyer, senator was active in tobacco\u2019s defense. New York Times, March 26, 2009"},{"issue":"4","key":"9165_CR30","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1037\/a0020666","volume":"139","author":"TT Hills","year":"2010","unstructured":"Hills TT (2010) The central executive as a search process: priming exploration and exploitation across domains. J Exp Psychol 139(4):590","journal-title":"J Exp Psychol"},{"key":"9165_CR31","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10791-012-9197-9","volume":"16","author":"K Hofmann","year":"2013","unstructured":"Hofmann K, Whitson S, de Rijke M (2013) Balancing exploration and exploitation in listwise and pairwise online learning to rank for information. Inf Retr 16:63\u201390","journal-title":"Inf Retr"},{"key":"9165_CR32","unstructured":"Holscher C, Strube G (2000) Web search behavior of internet experts and newbies, Cite as: www9.org\/w9cdrom\/81\/81.html"},{"key":"9165_CR33","unstructured":"Hyman HS, Fridy III W (2010) Using bag of words (BOW) and standard deviations to represent expected structures for document retrieval: a way of thinking that leads to method choices. In: NIST special publication, proceedings: text retrieval conference (TREC) 2010"},{"key":"9165_CR34","unstructured":"Hyman HS, Fridy III W (2011) Modeling concept and context to improve performance in eDiscovery. In: NIST special publication, proceedings: text retrieval conference (TREC) 2011"},{"key":"9165_CR35","unstructured":"Ignat C, Steinberger R, Pouliquen B, Erjavec T (2006) A tool set for the quick and efficient exploration of large document collections. Institute for the Protection and Security of the Citizen Joint research Centre, European Commission (2006)"},{"key":"9165_CR36","first-page":"284","volume":"22","author":"LP Kaelbling","year":"1996","unstructured":"Kaelbling LP (1996) Special issue on reinforcement learning. Mach Learn 22:284","journal-title":"Mach Learn"},{"key":"9165_CR37","volume-title":"Cognition and environment","author":"S Kaplan","year":"1982","unstructured":"Kaplan S, Kaplan R (1982) Cognition and environment. Praeger, New York"},{"key":"9165_CR38","doi-asserted-by":"crossref","unstructured":"Karimzadehgan M, Zhai CX (2010) Exploration\u2013exploitation tradeoff in interactive relevance feedback. In: Conference on information and knowledge management (2010)","DOI":"10.1145\/1871437.1871631"},{"key":"9165_CR39","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1002\/(SICI)1097-4571(199106)42:5<361::AID-ASI6>3.0.CO;2-#","volume":"42","author":"CC Kuhlthau","year":"1991","unstructured":"Kuhlthau CC (1991) Inside the search process: information seeking from the user\u2019s perspective. J Am Soc Inf Sci 42:361\u2013371","journal-title":"J Am Soc Inf Sci"},{"key":"9165_CR40","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1016\/j.is.2009.10.004","volume":"35","author":"S Lehman","year":"2010","unstructured":"Lehman S, Schwanecke U, Dorner R (2010) Interactive visualization for opportunistic exploration of large document collections. Inf Syst 35:260\u2013269","journal-title":"Inf Syst"},{"issue":"3","key":"9165_CR41","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1561\/1500000016","volume":"3","author":"TY Liu","year":"2009","unstructured":"Liu TY (2009) Learning to rank information retrieval. Found Trends Inf Retr 3(3):225\u2013331","journal-title":"Found Trends Inf Retr"},{"key":"9165_CR42","unstructured":"Losey R (2013) www.e-discoveryteam.com"},{"issue":"1","key":"9165_CR43","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1287\/orsc.2.1.71","volume":"2","author":"JG March","year":"1991","unstructured":"March JG (1991) Exploration and exploitation in organizational learning. Organ Sci 2(1):71\u201387","journal-title":"Organ Sci"},{"key":"9165_CR44","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s00799-004-0088-6","volume":"4","author":"D McKay","year":"2004","unstructured":"McKay D, Shukla P, Hunt R, Cunningham SJ (2004) Enhancing browsing in digital libraries: three new approaches to browsing in greenstone. Int J Dig Libr 4:283\u2013297","journal-title":"Int J Dig Libr"},{"key":"9165_CR45","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s00799-004-0109-5","volume":"5","author":"H Meuss","year":"2005","unstructured":"Meuss H, Schulz KU, Wiegel F, Leonardi S, Bry F (2005) Visual exploration and retrieval of XML document collections with the generic system X2. Int J Dig Libr 5:3\u201317","journal-title":"Int J Dig Libr"},{"key":"9165_CR46","doi-asserted-by":"crossref","unstructured":"Muramatsu J, Pratt W (2001) Transparent queries: investigating users\u2019 mental models of search engines, SIGIR 2001. ACM, New York","DOI":"10.1145\/383952.383991"},{"key":"9165_CR67","doi-asserted-by":"crossref","unstructured":"Muylle S, Moenaert R, Despontin M (1999) A grounded theory of World Wide Web search behaviour. J Marketing Commun 5(3):143\u2013155","DOI":"10.1080\/135272699345644"},{"key":"9165_CR48","unstructured":"Navarro-Prieto R, Scaife M, Rogers Y (1999) Cognitive strategies in web searching, Cited as: zing.ncsl.nist.gov\/hfweb\/proceedings\/Navarro-Prieto\/index.html (June 3, 1999)"},{"key":"9165_CR49","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s10506-010-9093-9","volume":"18","author":"DW Oard","year":"2010","unstructured":"Oard DW, Baron JR, Hedin B, Lewis DD, Tomlinson S (2010) Evaluation of information retrieval for E-discovery. Artif Intell Law 18:347","journal-title":"Artif Intell Law"},{"key":"9165_CR50","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1016\/j.eswa.2007.07.060","volume":"35","author":"M Oussalaleh","year":"2008","unstructured":"Oussalaleh M, Khan S, Nefti S (2008) Personalized information retrieval system in the framework of fuzzy logic. Expert Syst Appl 35:423","journal-title":"Expert Syst Appl"},{"key":"9165_CR51","unstructured":"Pace N, Zakaras L (2012)\u00a0Where the money goes: understanding litigant expenditures for producing electronic discovery. http:\/\/www.rand.org\/pubs\/monographs\/MG1208.html"},{"key":"9165_CR52","first-page":"10","volume":"13","author":"GL Paul","year":"2007","unstructured":"Paul GL, Baron JR (2007) Information inflation: can the legal system adapt? Richmond J Law Technol 13:10\u201317","journal-title":"Richmond J Law Technol"},{"key":"9165_CR53","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1090\/S0002-9904-1952-09620-8","volume":"58","author":"H Robbins","year":"1952","unstructured":"Robbins H (1952) Some aspects of the sequential design of experiments. Bull Am Math Soc 58:527\u2013535","journal-title":"Bull Am Math Soc"},{"issue":"11","key":"9165_CR66","first-page":"55","volume":"52","author":"B Settles","year":"2010","unstructured":"Settles B (2010) Active learning literature survey. Univ Wis Madison 52(11):55\u201366","journal-title":"Univ Wis Madison"},{"key":"9165_CR54","unstructured":"Schweighofer E, Geist A (2008) Legal query expansion using ontologies and relevance feedback, TREC conference 2008, proceedings"},{"key":"9165_CR55","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1002\/asmb.874","volume":"26","author":"SL Scott","year":"2010","unstructured":"Scott SL (2010) A modern bayesian look at the multi-armed bandit. Appl Stoch Models Bus Ind 26:639\u2013658","journal-title":"Appl Stoch Models Bus Ind"},{"key":"9165_CR56","unstructured":"Sedona (2014) Conference Best Practices Commentary on the Use of Search and Information Retrieval Methods in E-Discovery (2013 edition)"},{"key":"9165_CR57","unstructured":"The Sedona Conference (2014) Best Practices Commentary on the Use of Search and Information Retrieval Methods in E-Discovery, The Sedona Conference Commentary on Search and Retrieval (Volume XV)"},{"key":"9165_CR58","unstructured":"Tredennick J (2014) Pioneering Cormack\/Grossman study validates continuous learning, judgmental seeds and review team training for technology assisted review. http:\/\/www.catalystsecure.com\/blog\/2014\/05\/pioneering-cormackgrossman-study-validates-continuous-learning-judgmental-seeds-and-review-team-training-for-technology-assisted-review\/"},{"key":"9165_CR59","volume-title":"Information Retrieval","author":"CJ Rijsbergen Van","year":"1979","unstructured":"Van Rijsbergen CJ (1979) Information Retrieval. Butterworth, London"},{"key":"9165_CR60","unstructured":"Vijayakumar P, Unnikrishnan PC (2012) Modified action value method applied to \u2018n\u2019\u2014armed bandit problems using reinforcement learning. Int J Eng Sci Technol 4(12):4710\u20134716"},{"key":"9165_CR61","doi-asserted-by":"crossref","unstructured":"Wang L, Oard DW (2008) Query expansion for noisy legal documents, Text Retrieval Conference (TREC) 2008 proceedings","DOI":"10.6028\/NIST.SP.500-277.legal-UMCP"},{"issue":"5","key":"9165_CR62","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1109\/TMI.2013.2252431","volume":"32","author":"L Wang","year":"2013","unstructured":"Wang L, Lekadir K, Lee S, Merrifield R, Yang G (2013) A general framework for context-specific image segmentation using reinforcement learning. IEEE Trans Med Imaging 32(5):943\u2013956","journal-title":"IEEE Trans Med Imaging"},{"issue":"4","key":"9165_CR64","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1287\/orsc.1050.0133","volume":"16","author":"KE Weick","year":"2005","unstructured":"Weick KE, Sutcliffe KM, Obstfeld D (2005) Organizing and the process of sensemaking. Organ Sci 16(4):409\u2013421","journal-title":"Organ Sci"},{"issue":"5","key":"9165_CR63","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1287\/mnsc.1050.0488","volume":"52","author":"Z Zheng","year":"2006","unstructured":"Zheng Z, Padmanabhan B (2006) Selectively acquiring customer information: a new data acquisition problem and an active learning-based solution. Manag Sci 52(5):697\u2013712","journal-title":"Manag Sci"}],"container-title":["Artificial Intelligence and Law"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10506-015-9165-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10506-015-9165-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10506-015-9165-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10506-015-9165-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T04:26:19Z","timestamp":1717820779000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10506-015-9165-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,1]]},"references-count":66,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["9165"],"URL":"https:\/\/doi.org\/10.1007\/s10506-015-9165-y","relation":{},"ISSN":["0924-8463","1572-8382"],"issn-type":[{"value":"0924-8463","type":"print"},{"value":"1572-8382","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,1]]},"assertion":[{"value":"1 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}