{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:59:32Z","timestamp":1769925572044,"version":"3.49.0"},"reference-count":57,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2012,10,12]],"date-time":"2012-10-12T00:00:00Z","timestamp":1350000000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10,12]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This paper aims to report on a project aimed at moving Foster's nonlinear model of information seeking behaviour forwards from an empirically based model focused on one setting and towards one that is robustly transferable and enables testing of the model in other information\u2010seeking situations.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The method utilised recoding of the original dataset, comparison of code decisions, and testing of the code book on a second dataset.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The results of the coding confirm the structure and interactions in version one of the model. The dynamic and nonlinear nature of information seeking is confirmed, as are the core processes and contextual dimensions of the original model with some extension and refinement of coding.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Changes to the model include new scales of extent and intensity, refinement of code descriptions, and extension of some elements to include multidisciplinary theories. Collectively these changes enable testing of the model in other information situations and opportunities for further research.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The results incorporate a number of enhancements that have been developed since the original Foster model was created; cognitive dimensions relating to personality and learning are enhanced and the codes essential to the revised Foster model are described along with a code book. The paper concludes by highlighting areas for further research.<\/jats:p><\/jats:sec>","DOI":"10.1108\/00220411211277046","type":"journal-article","created":{"date-parts":[[2012,10,18]],"date-time":"2012-10-18T11:26:42Z","timestamp":1350559602000},"page":"784-805","source":"Crossref","is-referenced-by-count":27,"title":["Modelling nonlinear information behaviour: transferability and progression"],"prefix":"10.1108","volume":"68","author":[{"given":"Allen","family":"Foster","sequence":"first","affiliation":[]},{"given":"Christine","family":"Urquhart","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012320014131700_b1","unstructured":"Anderson, J.R. (1980), Cognitive Psychology and its Implications, Freeman, San Francisco, CA."},{"key":"key2022012320014131700_b2","unstructured":"Bartlett, F.C. (1932), Remembering, Cambridge University Press, Cambridge."},{"key":"key2022012320014131700_b3","unstructured":"Bates, M. (2007), \u201cWhat is browsing \u2010 really? A model drawing from behavioural science research\u201d, Information Research, Vol. 12 No. 4, available at: http:\/\/informationr.net\/ir\/12\u20104\/paper330.html (accessed 20 October 2011)."},{"key":"key2022012320014131700_b4","doi-asserted-by":"crossref","unstructured":"Brandt, D.S. (2001), \u201cInformation technology literacy: task knowledge and mental models\u201d, Library Trends, Vol. 50 No. 1, pp. 73\u201086.","DOI":"10.1080\/00049670.2001.10755943"},{"key":"key2022012320014131700_b5","unstructured":"Callison, D. (1997), \u201cMental models\u201d, School Library Media Activities Monthly, Vol. 14 No. 4, pp. 37\u20109."},{"key":"key2022012320014131700_b6","unstructured":"Case, D.O. (2007), Looking for Information: A Survey of Research on Information Seeking, Needs and Behaviour, Academic Press\/Elsevier, San Diego, CA."},{"key":"key2022012320014131700_b7","unstructured":"Chang, S.\u2010J. and Rice, R.E. (1993), \u201cBrowsing: a multidimensional framework\u201d, Annual Review of Information Science and Technology (ARIST), Vol. 28, pp. 231\u201076."},{"key":"key2022012320014131700_b8","doi-asserted-by":"crossref","unstructured":"Chen, H., Houston, A., Sewell, R.R. and Schatz, B.R. (1998), \u201cInternet browsing and searching: user evaluations of category map and concept space techniques\u201d, Journal of the American Society for Information Science, Vol. 49 No. 7, pp. 582\u2010603.","DOI":"10.1002\/(SICI)1097-4571(19980515)49:7<582::AID-ASI2>3.0.CO;2-X"},{"key":"key2022012320014131700_b9","unstructured":"Choo, W.C., Detlor, B. and Turnbull, D. (1999), \u201cInformation seeking on the web: an integrated model of browsing and searching\u201d, in Woods, L. (Ed.), Proceedings of the 62nd Annual Meeting of the American Society for Information Science, Washington, DC, October 31\u2010November 4, American Society for Information Science Annual Meeting Contributed Paper, Information Today, Medford, NJ, pp. 3\u201016, ."},{"key":"key2022012320014131700_b10","unstructured":"Dargentas, M. and Le Roux, D. (2005), \u201cPotentials and limits of secondary analysis in a specific applied context: the case of EDF\u2010Verbatim\u201d, Forum: Qualitative Social Research, Vol. 6 No. 1, article 40, available at: http:\/\/nbn\u2010resolving.de\/urn:nbn:de:0114\u2010fqs0501404 (accessed 20 October 2011)."},{"key":"key2022012320014131700_b11","unstructured":"Dervin, B. and Reinhard, C.D. (2006), \u201cResearchers and practitioners talk about users and each other. Making user and audience studies matter \u2013 paper 1\u201d, Information Research, Vol. 12 No. 1, available at: http:\/\/informationr.net\/ir\/12\u20101\/paper286.html (accessed 20 October 2011)."},{"key":"key2022012320014131700_b12","doi-asserted-by":"crossref","unstructured":"Ellis, D. and Haugan, M. (1997), \u201cModelling the information seeking patterns of engineers and research scientists in an industrial environment\u201d, Journal of Documentation, Vol. 53 No. 4, pp. 384\u2010403.","DOI":"10.1108\/EUM0000000007204"},{"key":"key2022012320014131700_b13","doi-asserted-by":"crossref","unstructured":"Entwistle, N. (1987), \u201cMotivation to learn: conceptualisations and practicalities\u201d, British Journal of Education Studies, Vol. XXXV No. 2, pp. 129\u201048.","DOI":"10.1080\/00071005.1987.9973757"},{"key":"key2022012320014131700_b14","doi-asserted-by":"crossref","unstructured":"Estrada, C.A., Isen, A.M. and Young, M.J. (1997), \u201cPositive affect facilitates integration of information and decreases anchoring in reasoning among physicians\u201d, Organizational Behavior and Human Decision Processes, Vol. 72, pp. 117\u201035.","DOI":"10.1006\/obhd.1997.2734"},{"key":"key2022012320014131700_b15","unstructured":"Fisher, K.E., Erdelez, S. and McKechnie, E.F. (Eds) (2005), Theories of Information Behavior: A Researcher's Guide, Information Today, Medford, NJ."},{"key":"key2022012320014131700_b18","unstructured":"Foster, A.E. (2003), \u201cInterdisciplinary information seeking behaviour: a naturalistic inquiry\u201d, unpublished PhD thesis, University of Sheffield, Sheffield."},{"key":"key2022012320014131700_b16","doi-asserted-by":"crossref","unstructured":"Foster, A.E. (2004), \u201cA nonlinear model of information seeking behaviour\u201d, Journal of the American Society for Information Science and Technology, Vol. 55 No. 3, pp. 228\u201037.","DOI":"10.1002\/asi.10359"},{"key":"key2022012320014131700_b19","doi-asserted-by":"crossref","unstructured":"Foster, A.E. and Ford, N.J. (2003), \u201cSerendipity and information seeking: an empirical study\u201d, Journal of Documentation, Vol. 59 No. 3, pp. 321\u201040.","DOI":"10.1108\/00220410310472518"},{"key":"key2022012320014131700_b17","unstructured":"Foster, A., Urquhart, C. and Turner, J. (2008), \u201cValidating coding for a theoretical model of information behaviour\u201d, Information Research, Vol. 13 No. 4, paper 358, available at: http:\/\/InformationR.net\/ir\/13\u20104\/paper358.html (accessed 18 October 2011)."},{"key":"key2022012320014131700_b20","doi-asserted-by":"crossref","unstructured":"Fransson, A. (1977), \u201cOn qualitative differences in learning. IV \u2013 Effects of motivation and test anxiety on process and outcome\u201d, British Journal of Educational Psychology, Vol. 47, pp. 244\u201057.","DOI":"10.1111\/j.2044-8279.1977.tb02353.x"},{"key":"key2022012320014131700_b21","unstructured":"Frannson, A. (1984), \u201cCramming or understanding? Effects of intrinsic and extrinsic motivation on approach to learning and test performance\u201d, in Alderson, J.C. and Urquhart, A.H. (Eds), Reading in a Foreign Language, Longman, London, pp. 86\u2010121."},{"key":"key2022012320014131700_b22","unstructured":"Frost, C.O. (2001), \u201cThe role of mental models in a multi\u2010modal image search\u201d, Information in a Networked World: Harnessing the Flow: Proceedings of the 64th Annual Meeting of the American Society for Information Science and Technology, Vol. 38, pp. 52\u20107."},{"key":"key2022012320014131700_b23","unstructured":"Gleitman, H., Fridlund, A.J. and Reisberg, D. (1999), Psychology, W.W. Norton & Co., New York, NY."},{"key":"key2022012320014131700_b25","unstructured":"Heaton, J. (1998), \u201cSecondary analysis of qualitative data\u201d, Social Research Update, No. 22."},{"key":"key2022012320014131700_b24","unstructured":"Heidorn, P.B. (1999), \u201cImage retrieval as linguistic and non\u2010linguistic visual model matching\u201d, Library Trends, Vol. 48 No. 2, pp. 303\u201025."},{"key":"key2022012320014131700_b26","doi-asserted-by":"crossref","unstructured":"Heinstrom, J. (2005), \u201cFast surfing, broad scanning and deep diving: the influence of personality and approach on students' information\u2010seeking behavior\u201d, Journal of Documentation, Vol. 61 No. 2, pp. 228\u201047.","DOI":"10.1108\/00220410510585205"},{"key":"key2022012320014131700_b27","doi-asserted-by":"crossref","unstructured":"Hirtle, S.C. and Heidorn, P.B. (1993), \u201cThe structure of cognitive maps: representations and processes\u201d, in Garling, T. and Golledge, R.G. (Eds), Behavior and Environment: Psychological and Geographical Approaches, North\u2010Holland, Amsterdam, pp. 170\u201092.","DOI":"10.1016\/S0166-4115(08)60043-6"},{"key":"key2022012320014131700_b28","doi-asserted-by":"crossref","unstructured":"Hj\u00f8rland, B. (2011), \u201cEvaluation of an information source illustrated by a case study: effect of screening for breast cancer\u201d, Journal of the American Society for Information Science & Technology, Vol. 62 No. 10, pp. 1892\u20108.","DOI":"10.1002\/asi.21606"},{"key":"key2022012320014131700_b29","doi-asserted-by":"crossref","unstructured":"Ingwersen, P. (1996), \u201cCognitive perspectives of information retrieval interaction: elements of a cognitive IR theory\u201d, Journal of Documentation, Vol. 52 No. 1, pp. 3\u201050.","DOI":"10.1108\/eb026960"},{"key":"key2022012320014131700_b31","doi-asserted-by":"crossref","unstructured":"Isen, A.M. (2009), \u201cA role for neuropsychology in understanding the facilitating influence of positive affect on social behavior and cognitive processes\u201d, in Snyder, C.R. and Lopez, S. (Eds), Handbook of Positive Psychology, Oxford University Press, New York, NY, pp. 528\u201040.","DOI":"10.1093\/oxfordhb\/9780195187243.013.0048"},{"key":"key2022012320014131700_b30","doi-asserted-by":"crossref","unstructured":"Isen, A.M., Daubman, K.A. and Nowicki, G.P. (1987), \u201cPositive affect facilitates creative problem solving\u201d, Journal of Personality and Social Psychology, Vol. 52, pp. 1122\u201031.","DOI":"10.1037\/0022-3514.52.6.1122"},{"key":"key2022012320014131700_b32","unstructured":"Kristeva, J. (1980), Desire in Language: A Semiotic Approach to Literature and Art, Columbia University Press, New York, NY."},{"key":"key2022012320014131700_b33","doi-asserted-by":"crossref","unstructured":"Kuhlthau, C.C. (1991), \u201cInside the search process: information seeking from the user's perspective\u201d, Journal of the American Society for Information Science, Vol. 42 No. 5, pp. 361\u201071.","DOI":"10.1002\/(SICI)1097-4571(199106)42:5<361::AID-ASI6>3.0.CO;2-#"},{"key":"key2022012320014131700_b34","doi-asserted-by":"crossref","unstructured":"Kuhlthau, C.C. (1993), \u201cA principle of uncertainty for information seeking\u201d, Journal of Documentation, Vol. 49 No. 4, pp. 339\u201055.","DOI":"10.1108\/eb026918"},{"key":"key2022012320014131700_b35","unstructured":"Kuzel, A.J. and Like, R.C. (1991), \u201cStandards of trustworthiness for qualitative studies in primary care\u201d, in Norton, P., Stewart, M., Tudiver, F., Bass, M. and Dunn, E. (Eds), Primary Care Research: Traditional and Innovative Approaches, Sage Publications, Newbury Park, CA, pp. 138\u201058."},{"key":"key2022012320014131700_b36","doi-asserted-by":"crossref","unstructured":"Lincoln, Y.S. and Guba, E.G. (1985), Naturalistic Inquiry, Sage Publications, Newbury Park, CA.","DOI":"10.1016\/0147-1767(85)90062-8"},{"key":"key2022012320014131700_b37","unstructured":"McGregor, J.H. (1994), \u201cInformation seeking and use: students' thinking and their mental models\u201d, Journal of Youth Services in Libraries, Vol. 8, Fall, pp. 69\u201076."},{"key":"key2022012320014131700_b38","doi-asserted-by":"crossref","unstructured":"Marchionini, G. and Shneiderman, B. (1988), \u201cFinding facts vs browsing knowledge in hypertext systems\u201d, Computer, Vol. 21 No. 1, pp. 70\u20109.","DOI":"10.1109\/2.222119"},{"key":"key2022012320014131700_b39","doi-asserted-by":"crossref","unstructured":"Marton, F. and Saljo, R. (1976), \u201cSymposium: learning processes and strategies: II. On qualitative differences in learning: II. Outcome as a function of the learner's conception of the task\u201d, British Journal of Educational Psychology, Vol. 46 No. 2, pp. 115\u201027.","DOI":"10.1111\/j.2044-8279.1976.tb02304.x"},{"key":"key2022012320014131700_b40","unstructured":"Medjedovi\u0107, I. (2011), \u201cSecondary analysis of qualitative interview data: objections and experiences. Results of a German feasibility study\u201d, Forum: Qualitative Social Research, Vol. 12 No. 3, article 10, available at: http:\/\/nbn\u2010resolving.de\/urn:nbn:de:0114\u2010fqs1103104 (accessed 20 October 2011)."},{"key":"key2022012320014131700_b41","doi-asserted-by":"crossref","unstructured":"Nicholas, D., Rowlands, I., Clark, D. and Williams, P. (2011), \u201cGoogle Generation II: web behaviour experiments with the BBC\u201d, Aslib Proceedings, Vol. 63 No. 1, pp. 28\u201045.","DOI":"10.1108\/00012531111103768"},{"key":"key2022012320014131700_b42","doi-asserted-by":"crossref","unstructured":"Norman, W.T. (1963), \u201cToward an adequate taxonomy of personality attributes: replicated factor structure in peer nomination personality ratings\u201d, Journal of Abnormal and Social Psychology, Vol. 66, pp. 574\u201083.","DOI":"10.1037\/h0040291"},{"key":"key2022012320014131700_b43","doi-asserted-by":"crossref","unstructured":"Pask, G. (1976), \u201cStyles and strategies of learning\u201d, British Journal of Educational Psychology, Vol. 46, pp. 128\u201048.","DOI":"10.1111\/j.2044-8279.1976.tb02305.x"},{"key":"key2022012320014131700_b44","doi-asserted-by":"crossref","unstructured":"Rice, R.E., McCreadie, M. and Chang, S.\u2010J.L. (2001), Accessing and Browsing Information and Communication, MIT Press, Cambridge, MA.","DOI":"10.7551\/mitpress\/1066.001.0001"},{"key":"key2022012320014131700_b46","unstructured":"Schank, R.C. and Abelson, R.P. (1977), Scripts, Plans, Goals, and Understanding, Lawrence Erlbaum Associates, Hillsdale, NJ."},{"key":"key2022012320014131700_b47","doi-asserted-by":"crossref","unstructured":"Slone, D.J. (2002), \u201cThe influence of mental models and goals on search patterns during web interaction\u201d, Journal of the American Society for Information Science and Technology, Vol. 53 No. 13, pp. 1152\u201069.","DOI":"10.1002\/asi.10141"},{"key":"key2022012320014131700_b48","unstructured":"Snyder, M. (1987), Public Appearance\/Private Realities: The Psychology of Self\u2010Monitoring, W.H. Freeman & Co., New York, NY."},{"key":"key2022012320014131700_b49","unstructured":"Steward, D.W. and Kamins, M.A. (1993), Secondary Research: Information Sources and Methods, Vol. 4, Sage Publications, Newbury Park, CA, Applied Social Research Methods Series."},{"key":"key2022012320014131700_b50","doi-asserted-by":"crossref","unstructured":"Stokes, P. and Urquhart, C. (2011), \u201cProfiling information behaviour of nursing students: part 1: quantitative findings\u201d, Journal of Documentation, Vol. 67 No. 6, pp. 908\u201032.","DOI":"10.1108\/00220411111183528"},{"key":"key2022012320014131700_b51","doi-asserted-by":"crossref","unstructured":"Tabak, E. and Willson, M. (2012), \u201cA non\u2010linear model of information sharing practices in academic communities\u201d, Library & Information Science Research, Vol. 34 No. 2, pp. 110\u20106.","DOI":"10.1016\/j.lisr.2011.11.002"},{"key":"key2022012320014131700_b52","doi-asserted-by":"crossref","unstructured":"Thorne, S. (1998), \u201cPearls, pith, and provocation: ethical and representational issues in qualitative secondary analysis\u201d, Qualitative Health Research, Vol. 8 No. 4, pp. 547\u201055.","DOI":"10.1177\/104973239800800408"},{"key":"key2022012320014131700_b53","unstructured":"Toms, E.G. (1998), \u201cInformation exploration of the third kind: the concept of chance encounters: a position paper for the CHI98 Workshop on Information Exploration\u201d, available at: www.fxpal.com\/CHI98IE\/submissions\/long\/toms\/index.htm (accessed 10 June 2002)."},{"key":"key2022012320014131700_b55","unstructured":"Urquhart, A.H. and Weir, C.J. (1998), Reading in a Second Language: Process, Product, and Practice, Longman, New York, NY."},{"key":"key2022012320014131700_b54","doi-asserted-by":"crossref","unstructured":"Urquhart, C. and Rowley, J. (2007), \u201cUnderstanding student information behaviour in relation to electronic information services: lessons from longitudinal monitoring and evaluation, part 2\u201d, Journal of the American Society for Information Science and Technology, Vol. 58 No. 8, pp. 1188\u201097.","DOI":"10.1002\/asi.20562"},{"key":"key2022012320014131700_b56","unstructured":"Vakkari, P. (1998), \u201cTask complexity, information types, search strategies and relevance: integrating studies on information seeking and retrieval\u201d, in Wilson, T.D. and Allen, D.K. (Eds), Exploring the Contexts of Information Behaviour: Proceedings of the Second International Conference on Research in Information Needs, Seeking and Use in Different Contexts, 13\u201015 August, Sheffield, Taylor Graham, London, pp. 35\u201054."},{"key":"key2022012320014131700_b57","unstructured":"Widdowson, H.G. (1984), \u201cReading and communication\u201d, in Alderson, J.C. and Urquhart, A.H. (Eds), Reading in a Foreign Language, Longman, London."},{"key":"key2022012320014131700_b58","doi-asserted-by":"crossref","unstructured":"Wilson, T.D., Ford, N., Ellis, D., Foster, A. and Spink, A. (2002), \u201cInformation seeking and mediated searching. Part 2. Uncertainty and its correlates\u201d, Journal of the American Society for Information Science and Technology, Vol. 53 No. 9, pp. 704\u201015.","DOI":"10.1002\/asi.10082"}],"container-title":["Journal of Documentation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/00220411211277046","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00220411211277046\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00220411211277046\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:38:31Z","timestamp":1753400311000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jd\/article\/68\/6\/784-805\/202270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,12]]},"references-count":57,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2012,10,12]]}},"alternative-id":["10.1108\/00220411211277046"],"URL":"https:\/\/doi.org\/10.1108\/00220411211277046","relation":{},"ISSN":["0022-0418"],"issn-type":[{"value":"0022-0418","type":"print"}],"subject":[],"published":{"date-parts":[[2012,10,12]]}}}