{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:53:13Z","timestamp":1754157193414,"version":"3.41.2"},"reference-count":22,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2007,3,13]],"date-time":"2007-03-13T00:00:00Z","timestamp":1173744000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,3,13]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this research is to discuss the methodological aspects of a study, the results of which are detailed in a second paper.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Indices of search goal revision (or redefinition) were constructed based on the chronological coding of queries logged on the OCLC FirstSearch service. Queries within search sessions were coded according to their conceptual relationships, based on a set of rules designed to identify possible revisions of search goals, as well as strategic reformulations. Given the same user interface, similar types of user, and large datasets, it was assumed that the number of strategic reformulations would be reasonably uniform across databases, so that the indices could be regarded as indicators of relative amounts of goal revision.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The reliability of the coding used to construct the indices of goal redefinition was tested through parallel coding, and confirmed. Differences between the indices for various databases, on the other hand, were found to be statistically significant, allowing for the conclusion that the indices were able to show differences in the amount of goal redefinition occurring, given the assumption of similar levels of strategic reformulations across databases.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>Transaction log analysis has mostly focused on syntactic issues; few analyses have examined the semantic content of queries or contextualised individual queries as part of an evolving search session. However, this paper shows that although transaction log analysis is a relatively indirect means of examining users' thoughts and intentions during their interaction with an information retrieval system, logs that provide sufficiently rich data may, in certain controlled situations, be used to provide deeper insights into information retrieval behaviour.<\/jats:p><\/jats:sec>","DOI":"10.1108\/00220410710737169","type":"journal-article","created":{"date-parts":[[2007,3,9]],"date-time":"2007-03-09T03:46:20Z","timestamp":1173411980000},"page":"175-187","source":"Crossref","is-referenced-by-count":2,"title":["Constructing an index of search goal redefinition through transaction log analysis"],"prefix":"10.1108","volume":"63","author":[{"given":"Philip M.","family":"Hider","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022020620212622100_b1","doi-asserted-by":"crossref","unstructured":"Blecic, D.D., Bangalore, N.S. and Dorsch, J.L. (1998), \u201cUsing transaction log analysis to improve OPAC retrieval results\u201d, College & Research Libraries, Vol. 59 No. 1, pp. 39\u201050.","DOI":"10.5860\/crl.59.1.39"},{"key":"key2022020620212622100_b2","doi-asserted-by":"crossref","unstructured":"Blecic, D.D., Koenig, M.H., Dorsch, J.L. and Bangalore, N.S. (1999), \u201cA longitudinal study of the effects of OPAC screen changes on searching behaviour and searcher success\u201d, College & Research Libraries, Vol. 60 No. 6, pp. 515\u201030.","DOI":"10.5860\/crl.60.6.515"},{"key":"key2022020620212622100_b3","unstructured":"Cherry, J.M. (1992), \u201cImproving subject access in OPACs: an exploratory study of conversion of users' queries\u201d, Journal of Academic Librarianship, Vol. 18, pp. 95\u20109."},{"key":"key2022020620212622100_b4","doi-asserted-by":"crossref","unstructured":"Dalrymple, P.W. (1990), \u201cRetrieval by reformulation in two library catalogs: toward a cognitive model of searching behaviour\u201d, Journal of the American Society for Information Science, Vol. 41, pp. 272\u201081.","DOI":"10.1002\/(SICI)1097-4571(199006)41:4<272::AID-ASI6>3.0.CO;2-5"},{"key":"key2022020620212622100_b5","doi-asserted-by":"crossref","unstructured":"Flaherty, P. (1993), \u201cTransaction logging systems: a descriptive summary\u201d, Library Hi Tech, Vol. 11 No. 2, pp. 67\u201078.","DOI":"10.1108\/eb047885"},{"key":"key2022020620212622100_b6","doi-asserted-by":"crossref","unstructured":"He, D., G\u00f6ker, A. and Harper, D.J. (2002), \u201cCombining evidence for automatic Web session identification\u201d, Information Processing & Management, Vol. 38, pp. 727\u201042.","DOI":"10.1016\/S0306-4573(01)00060-7"},{"key":"key2022020620212622100_b7","doi-asserted-by":"crossref","unstructured":"Hider, P. (2006), \u201cSearch goal redefinition through user\u2010system interaction\u201d, Journal of Documentation (in press).","DOI":"10.1108\/00220410710737178"},{"key":"key2022020620212622100_b8","doi-asserted-by":"crossref","unstructured":"Jansen, B.J. and Spink, A. (2000), \u201cMethodological approach in discovering user search patterns through Web log analysis\u201d, Bulletin of the American Society for Information Science, Vol. 27 No. 1, pp. 15\u201017.","DOI":"10.1002\/bult.185"},{"key":"key2022020620212622100_b9","doi-asserted-by":"crossref","unstructured":"Jansen, B.J., Spink, A. and Saracevic, T. (2000), \u201cReal life, real users, and real needs: a study and analysis of user queries on the web\u201d, Information Processing & Management, Vol. 36, pp. 207\u201027.","DOI":"10.1016\/S0306-4573(99)00056-4"},{"key":"key2022020620212622100_b10","doi-asserted-by":"crossref","unstructured":"Jones, S., Gatford, M. and Do, T. (1997), \u201cTransaction logging in Okapi\u2010related projects\u201d, Journal of Documentation, Vol. 53 No. 1, pp. 35\u201050.","DOI":"10.1108\/EUM0000000007189"},{"key":"key2022020620212622100_b11","doi-asserted-by":"crossref","unstructured":"Large, A. and Beheshti, J. (1997), \u201cOPACs: a research review\u201d, Library & Information Science Research, Vol. 19, pp. 111\u201033.","DOI":"10.1016\/S0740-8188(97)90039-6"},{"key":"key2022020620212622100_b12","doi-asserted-by":"crossref","unstructured":"Lau, T. and Horvitz, E. (1999), \u201cPatterns of search: analyzing and modeling Web query refinement\u201d, in Kay, J. (Ed.), User Modeling: Proceedings of the Seventh International Conference, UM99, Springer, Wien, pp. 119\u201028.","DOI":"10.1007\/978-3-7091-2490-1_12"},{"key":"key2022020620212622100_b13","doi-asserted-by":"crossref","unstructured":"Nicholas, D., Huntington, P. and Homewood, J. (2003), \u201cAssessing used content across five digital health information services using transaction log files\u201d, Journal of Information Science, Vol. 29 No. 6, pp. 499\u2010515.","DOI":"10.1177\/0165551503296007"},{"key":"key2022020620212622100_b14","doi-asserted-by":"crossref","unstructured":"Nicholas, D., Huntington, P. and Watkinson, A. (2005), \u201cScholarly journal usage: the results of deep log analysis\u201d, Journal of Documentation, Vol. 61 No. 2, pp. 248\u201080.","DOI":"10.1108\/00220410510585214"},{"key":"key2022020620212622100_b15","doi-asserted-by":"crossref","unstructured":"Peters, T.A. (1993), \u201cThe history and development of transaction log analysis\u201d, Library Hi Tech, Vol. 11 No. 2, pp. 41\u201066.","DOI":"10.1108\/eb047884"},{"key":"key2022020620212622100_b16","doi-asserted-by":"crossref","unstructured":"Pu, H.\u2010T., Chuang, S.\u2010L. and Yang, C. (2002), \u201cSubject categorization of query terms for exploring Web users' search interests using Taiwan search engine logs\u201d, Journal of the American Society for Information Science & Technology, Vol. 53 No. 8, pp. 617\u201030.","DOI":"10.1002\/asi.10071"},{"key":"key2022020620212622100_b17","unstructured":"Robins, D. (1997), \u201cShifts of focus in information retrieval interaction\u201d, in Schwartz, C. and Rorvig, M. (Eds), ASIS '97: Proceedings of the 60th ASIS Annual Meeting, Information Today, Medford, NJ, pp. 123\u201034."},{"key":"key2022020620212622100_b18","doi-asserted-by":"crossref","unstructured":"Robins, D. (2000), \u201cShifts of focus on various aspects of user information problems during interactive information retrieval\u201d, Journal of the American Society for Information Science, Vol. 51 No. 10, pp. 913\u201028.","DOI":"10.1002\/1097-4571(2000)51:10<913::AID-ASI40>3.0.CO;2-N"},{"key":"key2022020620212622100_b19","unstructured":"Walker, S. and Jones, R.M. (1987), Improving Subject Retrieval in Online Catalogues. 1, Stemming, Automatic Spelling Correction and Cross\u2010reference Tables, British Library, London."},{"key":"key2022020620212622100_b20","unstructured":"Wallace, P.M. (1993), \u201cHow do patrons search the online catalog when no one's looking? Transaction log analysis and implications for bibliographic instruction and design\u201d, RQ, Vol. 33, pp. 239\u201052."},{"key":"key2022020620212622100_b21","unstructured":"Wiberley, S.E., Daugherty, R.A. and Danowski, J.A. (1995), \u201cUser persistence in displaying online catalog postings: LUIS\u201d, Library Resources & Technical Services, Vol. 39, pp. 247\u201064."},{"key":"key2022020620212622100_b22","doi-asserted-by":"crossref","unstructured":"Wyly, B.J. (1996), \u201cFrom access points to materials: a transaction log analysis of access point value for online catalog users\u201d, Library Resources & Technical Services, Vol. 40, pp. 211\u201036.","DOI":"10.5860\/lrts.40n3.211"}],"container-title":["Journal of Documentation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/00220410710737169","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00220410710737169\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00220410710737169\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:37:46Z","timestamp":1753400266000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jd\/article\/63\/2\/175-187\/433769"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3,13]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2007,3,13]]}},"alternative-id":["10.1108\/00220410710737169"],"URL":"https:\/\/doi.org\/10.1108\/00220410710737169","relation":{},"ISSN":["0022-0418"],"issn-type":[{"type":"print","value":"0022-0418"}],"subject":[],"published":{"date-parts":[[2007,3,13]]}}}