{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T15:31:13Z","timestamp":1759937473087,"version":"3.41.2"},"reference-count":32,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2011,1,18]],"date-time":"2011-01-18T00:00:00Z","timestamp":1295308800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1,18]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This research aims to identify some requirements for supporting user interactions with electronic current\u2010awareness alert systems based on data from a professional work environment.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Qualitative data were gathered using contextual inquiry observations with 21 workers at the London office of an international law firm. The analysis uses CASSM (\u201cConcept\u2010based Analysis of Surface and Structural Misfits\u201d), a usability evaluation method structured around identifying mismatches, or \u201cmisfits\u201d, between user\u2010concepts and concepts represented within a system.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>Participants were frequently overwhelmed by e\u2010mail alerts, and a key requirement is to support efficient interaction. Several misfits, which act as barriers to efficient reviewing and follow\u2010on activities, are demonstrated. These relate to a lack of representation of key user\u2010concepts at the interface and\/or within the system, including alert items and their properties, source documents, \u201cback\u2010story\u201d, primary sources, content categorisations and user collections.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>Given these misfits, a set of requirements is derived to improve the efficiency with which users can achieve key outcomes with current\u2010awareness information as these occur within a professional work environment.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The findings will be of interest to current\u2010awareness providers. The approach is relevant to information interaction researchers interested in deriving design requirements from naturalistic studies.<\/jats:p><\/jats:sec>","DOI":"10.1108\/00220411111105443","type":"journal-article","created":{"date-parts":[[2011,1,22]],"date-time":"2011-01-22T07:23:55Z","timestamp":1295681035000},"page":"33-55","source":"Crossref","is-referenced-by-count":6,"title":["Conceptual misfits in e\u2010mail\u2010based current\u2010awareness interaction"],"prefix":"10.1108","volume":"67","author":[{"given":"Simon","family":"Attfield","sequence":"first","affiliation":[]},{"given":"Ann","family":"Blandford","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020619552890800_b1","unstructured":"Attfield, S. and Blandford, A. (in press), \u201cUnderstanding social and interactional practices underlying the dissemination of electronic current\u2010awareness in an organisational setting\u201d, Information Processing and Management."},{"key":"key2022020619552890800_b2","unstructured":"Bates, M. (2002), \u201cTowards an integrated model of information seeking and searching\u201d, in Wilson, T. and Barrulas, M. (Eds), The New Review of Information Behaviour Research: Studies of Information Seeking in Context, Vol. 3, Taylor Graham, London, pp. 1\u201015 (Proceedings ISIC IV, The 4th international conference on research in information needs, seeking and use in different contexts)."},{"key":"key2022020619552890800_b3","doi-asserted-by":"crossref","unstructured":"Bayer, H. and Holtzblatt, K. (1998), Contextual Design: Defining Customer\u2010Centered Systems, Morgan Kaufman, San Francisco, CA.","DOI":"10.1145\/286498.286629"},{"key":"key2022020619552890800_b4","unstructured":"Blandford, A., Connell, I. and Green, T. (2004), \u201cConcept\u2010based analysis of surface and structural misfits (CASSM)\u201d, tutorial notes, available at: www.uclic.ucl.ac.uk\/annb\/CASSM\/downloadables\/CASSMtutorial.pdf (accessed July 2009)."},{"key":"key2022020619552890800_b5","doi-asserted-by":"crossref","unstructured":"Blandford, A., Green, T., Furniss, D. and Makri, S. (2008), \u201cEvaluating system utility and conceptual fit using CASSM\u201d, International Journal of Human\u2010Computer Studies, Vol. 66 No. 6, pp. 393\u2010409.","DOI":"10.1016\/j.ijhcs.2007.11.005"},{"key":"key2022020619552890800_b6","doi-asserted-by":"crossref","unstructured":"Blandford, A., Wong, B., Connell, I. and Green, T. (2002), \u201cMultiple viewpoints on computer supported team work: a case study on ambulance dispatch\u201d, in Faulkner, X., Finlay, J. and D\u00e9tienne, F. (Eds), People and Computers XVI, Proceedings HCI'02, Springer, New York, NY, pp. 139\u201056.","DOI":"10.1007\/978-1-4471-0105-5_9"},{"key":"key2022020619552890800_b7","doi-asserted-by":"crossref","unstructured":"Blomberg, J., Suchman, L. and Trigg, R.H. (1996), \u201cReflections on a work\u2010oriented design project\u201d, Human Computer Interaction, Vol. 11 No. 3, pp. 237\u201065.","DOI":"10.1207\/s15327051hci1103_3"},{"key":"key2022020619552890800_b8","doi-asserted-by":"crossref","unstructured":"Burke, E. (2009), \u201cThe exploration of relationships between information fulfilment and organisational design\u201d, Journal of Documentation, Vol. 65 No. 4, pp. 561\u201077.","DOI":"10.1108\/00220410910970258"},{"key":"key2022020619552890800_b9","doi-asserted-by":"crossref","unstructured":"Connell, I., Green, T. and Blandford, A. (2003), \u201cOntological sketch models: highlighting user\u2010system misfits\u201d, in O'Neill, E., Palanque, P. and Johnson, P. (Eds), People and Computers XVII, Proceedings HCI'03, Springer, New York, NY, pp. 163\u201078.","DOI":"10.1007\/978-1-4471-3754-2_10"},{"key":"key2022020619552890800_b10","doi-asserted-by":"crossref","unstructured":"Dumais, S., Cutrell, E. and Chen, H. (2001), \u201cOptimizing search by showing results in context\u201d, Proc. CHI 01, pp. 277\u201084.","DOI":"10.1145\/365024.365116"},{"key":"key2022020619552890800_b11","doi-asserted-by":"crossref","unstructured":"Ellis, D. (1989), \u201cA behavioural approach to information retrieval system design\u201d, Journal of Documentation, Vol. 45 No. 3, pp. 171\u2010212.","DOI":"10.1108\/eb026843"},{"key":"key2022020619552890800_b13","doi-asserted-by":"crossref","unstructured":"Ellis, D. and Haugan, M. (1997), \u201cModelling the information\u2010seeking patterns of engineers and research scientists in an industrial environment\u201d, Journal of Documentation, Vol. 53 No. 4, pp. 384\u2010403.","DOI":"10.1108\/EUM0000000007204"},{"key":"key2022020619552890800_b12","doi-asserted-by":"crossref","unstructured":"Ellis, D., Cox, D. and Hall, K. (1993), \u201cA comparison of the information\u2010seeking patterns of researchers in the physical and social sciences\u201d, Journal of Documentation, Vol. 49 No. 4, pp. 356\u201069.","DOI":"10.1108\/eb026919"},{"key":"key2022020619552890800_b14","doi-asserted-by":"crossref","unstructured":"Farooq, U., Ganoe, C., Carroll, J., Councill, I. and Giles, C. (2008), \u201cDesign and evaluation of awareness mechanisms in CiteSeer\u201d, Information Processing and Management, Vol. 44 No. 2, pp. 569\u2010612.","DOI":"10.1016\/j.ipm.2007.05.009"},{"key":"key2022020619552890800_b15","doi-asserted-by":"crossref","unstructured":"Fernandez, L. (2002), \u201cUser perceptions of current\u2010awareness services: a faculty survey\u201d, Issues in Science & Technology Librarianship, No. 33, available at: www.library.ucsb.edu\/istl\/previous.html (accessed May 2009).","DOI":"10.29173\/istl1878"},{"key":"key2022020619552890800_b16","doi-asserted-by":"crossref","unstructured":"Green, T. and Benyon, D. (1996), \u201cThe skull beneath the skin: entity\u2010relationship models of information artifacts\u201d, International Journal of Human\u2010Computer Studies, Vol. 44 No. 6, pp. 801\u201028.","DOI":"10.1006\/ijhc.1996.0034"},{"key":"key2022020619552890800_b17","doi-asserted-by":"crossref","unstructured":"Hinze, A., Buchanan, G., Jung, D. and Adams, A. (2006), \u201cHDLalert \u2013 a healthcare DL alerting system: from user needs to implementation\u201d, Health Informatics Journal, Vol. 12 No. 2, pp. 121\u201035.","DOI":"10.1177\/1460458206063808"},{"key":"key2022020619552890800_b18","unstructured":"Ingwersen, P. and J\u00e4rvelin, J. (2005), The Turn, Springer, Dordrecht."},{"key":"key2022020619552890800_b19","unstructured":"Johnson, J. (1990), Selecting Ethnographic Informant, Sage, Newbury Park, CA."},{"key":"key2022020619552890800_b20","doi-asserted-by":"crossref","unstructured":"Klein, H.K. and Myers, M.D. (1999), \u201cA set of principles for conducting and evaluating interpretive field studies in information systems\u201d, MIS Quarterly, Vol. 23 No. 1, pp. 67\u201094.","DOI":"10.2307\/249410"},{"key":"key2022020619552890800_b21","doi-asserted-by":"crossref","unstructured":"Kuhlthau, C. and Tama, S. (2001), \u201cInformation search process of lawyers: a call for \u2018just for me\u2019 information services\u201d, Journal of Documentation, Vol. 57 No. 1, pp. 25\u201043.","DOI":"10.1108\/EUM0000000007076"},{"key":"key2022020619552890800_b22","doi-asserted-by":"crossref","unstructured":"Makri, S., Blandford, A. and Cox, A.L. (2008), \u201cInvestigating the information\u2010seeking behaviour of academic lawyers: from Ellis's model to design\u201d, Information Processing and Management, Vol. 44 No. 2, pp. 613\u201034.","DOI":"10.1016\/j.ipm.2007.05.001"},{"key":"key2022020619552890800_b23","doi-asserted-by":"crossref","unstructured":"Marshall, C., Price, M., Golovchinsky, G. and Schilt, B. (2001), \u201cDesigning e\u2010books for legal research\u201d, Proceedings of the 1st ACM\/IEEE\u2010CS Joint Conference on Digital Libraries, Roanoke, Virginia, USA, 2001, pp. 41\u20108.","DOI":"10.1145\/379437.379445"},{"key":"key2022020619552890800_b24","doi-asserted-by":"crossref","unstructured":"Meho, L. and Tibbo, H. (2003), \u201cModeling the information\u2010seeking behaviour of social scientists: Ellis' study revisited\u201d, Journal of the American Society for Information Science and Technology, Vol. 54 No. 6, pp. 570\u201087.","DOI":"10.1002\/asi.10244"},{"key":"key2022020619552890800_b25","doi-asserted-by":"crossref","unstructured":"Moran, T. (1983), \u201cGetting into a system: external\u2010internal task mapping analysis\u201d, in Janda, A, (Ed.), Proceedings CHI 83, pp. 45\u20109.","DOI":"10.1145\/800045.801578"},{"key":"key2022020619552890800_b26","unstructured":"Nielsen, J. (1994), \u201cHeuristic evaluation\u201d, in Nielsen, J. and Mack, R. (Eds), Usability Inspection Methods, John Wiley, New York, NY, pp. 25\u201062."},{"key":"key2022020619552890800_b27","doi-asserted-by":"crossref","unstructured":"Payne, S., Squibb, H. and Howes, A. (1990), \u201cThe nature of device models: the yoked state space hypothesis, and some experiments with text editors\u201d, Human\u2010Computer Interaction, Vol. 5 No. 4, pp. 415\u201044.","DOI":"10.1207\/s15327051hci0504_3"},{"key":"key2022020619552890800_b28","unstructured":"Strauss, A. and Corbin, J. (1998), Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory, 2nd ed., Sage, London."},{"key":"key2022020619552890800_b29","unstructured":"Vicente, K. (1999), Cognitive Work Analysis, Lawrence Erlbaum, Mahwah, NJ."},{"key":"key2022020619552890800_b30","unstructured":"Wharton, C., Rieman, J., Lewis, C. and Polson, P. (1994), \u201cThe cognitive walkthrough method: a practitioner's guide\u201d, in Nielsen, J. and Mack, R. (Eds), Usability Inspection Methods, John Wiley, New York, NY, pp. 105\u201040."},{"key":"key2022020619552890800_b31","doi-asserted-by":"crossref","unstructured":"Young, R., Green, T. and Simon, T. (1989), \u201cProgrammable user models for predictive evaluation of interface designs\u201d, in Bice, K. and Lewis, C. (Eds), Proceedings CHI \u201889, pp. 15\u201019.","DOI":"10.1145\/67450.67453"},{"key":"key2022020619552890800_b32","doi-asserted-by":"crossref","unstructured":"Yuan, W. (1997), \u201cEnd\u2010user searching behaviour in information retrieval: a longitudinal study\u201d, Journal of the American Society for Information Science and Technology, Vol. 48 No. 3, pp. 218\u201034.","DOI":"10.1002\/(SICI)1097-4571(199703)48:3<218::AID-ASI4>3.0.CO;2-#"}],"container-title":["Journal of Documentation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/00220411111105443","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00220411111105443\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00220411111105443\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:38:17Z","timestamp":1753400297000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jd\/article\/67\/1\/33-55\/206509"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,18]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1,18]]}},"alternative-id":["10.1108\/00220411111105443"],"URL":"https:\/\/doi.org\/10.1108\/00220411111105443","relation":{},"ISSN":["0022-0418"],"issn-type":[{"type":"print","value":"0022-0418"}],"subject":[],"published":{"date-parts":[[2011,1,18]]}}}