{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T15:05:15Z","timestamp":1767625515493},"reference-count":26,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[1993,5]]},"DOI":"10.1080\/01449299308924376","type":"journal-article","created":{"date-parts":[[2007,6,25]],"date-time":"2007-06-25T03:36:13Z","timestamp":1182742573000},"page":"149-164","source":"Crossref","is-referenced-by-count":32,"title":["Sleuthing in HyperHolmes : a<sup>TM<\/sup>an evaluation of using hypertext vs. a book to answer questions"],"prefix":"10.1080","volume":"12","author":[{"given":"LAURA MARIE","family":"LEVENTHAL","sequence":"first","affiliation":[]},{"given":"BARBEE MYNATT","family":"TEASLEY","sequence":"additional","affiliation":[]},{"given":"KEITH","family":"INSTONE","sequence":"additional","affiliation":[]},{"given":"DIANE SCHERTLER","family":"ROHLMAN","sequence":"additional","affiliation":[]},{"given":"JOHN","family":"FARHAT","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1080\/01449298508901791"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1080\/01449298608914518"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(05)80168-3"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1080\/00140139208967394"},{"key":"CIT0005","first-page":"587","author":"DILLON A.","year":"1990","journal-title":"Interact '90 Proceedings"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1080\/01449298408901744"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1145\/122974.123002"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1145\/64789.64790"},{"key":"CIT0009","unstructured":"FARHAT , J. 1991 , HyperHolmes the techniques used in the analysis , Department of Computer Science Technical Report (91\u2013MAY\u201301), Bowling Green State University ."},{"key":"CIT0010","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1177\/001872088702900501","volume":"29","author":"GOULD J. D.","year":"1987","journal-title":"Human Factors"},{"key":"CIT0011","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1080\/08886504.1990.10781932","volume":"22","author":"HELLER R. S.","year":"1990","journal-title":"Journal of Research in Computing in Education"},{"key":"CIT0012","first-page":"101","volume-title":"Human\u2013Computer Interaction\u2013INTERACT '90","author":"HENDRY D. G.","year":"1990"},{"key":"CIT0013","unstructured":"INSTONE , K. 1990 , A general hypertext authoring stack for Macintosh, Department of Computer Science Technical Report (90\u2013AUG\u201301) , Bowling Green State University ."},{"key":"CIT0014","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/2.222119","volume":"21","author":"MARCHIONINI G.","year":"1988","journal-title":"IEEE Computer"},{"key":"CIT0015","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1080\/09558543.1989.12031163","volume":"1","author":"MCKNIGHT C.","year":"1989","journal-title":"Hypermedia"},{"key":"CIT0016","author":"MCKNIGHT C.","year":"1990","journal-title":"Hypertext State of the Art"},{"key":"CIT0017","volume-title":"Hypertext in Context","author":"MCKNIGHT C.","year":"1991"},{"key":"CIT0018","volume-title":"Hypertext and Hypermedia","author":"NIELSEN J.","year":"1990"},{"key":"CIT0019","first-page":"207","volume-title":"Cognitive Engineering in the Design of Human\u2013Computer Interaction and Expert Systems","author":"SHNEIDERMAN B.","year":"1987"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1145\/317426.317441"},{"key":"CIT0021","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1080\/09558543.1990.12031179","volume":"2","author":"SHUM S.","year":"1990","journal-title":"Hypermedia"},{"key":"CIT0022","volume-title":"Advances in Child Development and Behavior","volume":"10","author":"SIEOEL A. W.","year":"1975"},{"key":"CIT0023","author":"SIMPSON A.","year":"1990","journal-title":"Hypertext State of the Art"},{"key":"CIT0024","doi-asserted-by":"crossref","first-page":"259","DOI":"10.3758\/BF03214393","volume":"17","author":"SMITH K. H.","year":"1985","journal-title":"Behavior Research Methods, Instruments & Computers"},{"key":"CIT0025","volume-title":"The Encyclopaedia Sherlockiana","author":"TRACY J.","year":"1977"},{"key":"CIT0026","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/2.222120","volume":"21","author":"YANKELOVICH N.","year":"1988","journal-title":"IEEE Computer"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01449299308924376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T07:34:41Z","timestamp":1556523281000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/01449299308924376"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993,5]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1993,5]]}},"alternative-id":["10.1080\/01449299308924376"],"URL":"https:\/\/doi.org\/10.1080\/01449299308924376","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[1993,5]]}}}