{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T02:01:17Z","timestamp":1760061677009,"version":"3.41.2"},"reference-count":26,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2003,10,1]],"date-time":"2003-10-01T00:00:00Z","timestamp":1064966400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003,10,1]]},"abstract":"<jats:p>The paper develops a behavioral model of Web information seeking that identifies four complementary modes of information seeking: undirected viewing, conditioned  viewing, informal search, and formal search. In each mode of viewing or searching, users would adopt distinctive patterns of browser moves: starting, chaining, browsing, differentiating, monitoring, and extracting. The model is applied empirically to analyze the Web information seeking behavior of 24 women in IT professions over a two\u2010week period. Our results show that participants engaged in all four modes of information seeking on the Web, and that each mode may be characterized by certain browser actions. Overall, the study suggests that a behavioral approach that links information seeking modes (goals and reasons for browsing and searching) to moves (actions used to find and view information) may be helpful in understanding Web\u2010based information seeking.<\/jats:p>","DOI":"10.1108\/10662240310488951","type":"journal-article","created":{"date-parts":[[2003,9,7]],"date-time":"2003-09-07T02:49:56Z","timestamp":1062902996000},"page":"267-280","source":"Crossref","is-referenced-by-count":20,"title":["Information seeking on the Web by women in IT professions"],"prefix":"10.1108","volume":"13","author":[{"given":"Chun","family":"Wei Choo","sequence":"first","affiliation":[]},{"given":"Christine","family":"Marton","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"unstructured":"Aguilar, F.J. (1967), Scanning the Business Environment, Macmillan Co., New York, NY.","key":"key2022021620204612000_B1"},{"unstructured":"Catalyst (2000a), Women in Information Technology, InfoBrief, available at: www.catalystwomen.org\/press\/infobriefs\/infombatech.html","key":"key2022021620204612000_B2"},{"unstructured":"Catalyst (2000b), MBA Grads in Info Tech: Women and Men in the Information Technology Industry, Catalyst,  New York, NY.","key":"key2022021620204612000_B3"},{"unstructured":"Catledge, L.D. and Pitkow, J.E. (1995), \u201cCharacterizing browsing strategies in the World Wide Web\u201d, available at: www.igd.fhg.de\/www\/www95\/papers\/80\/userpatterns\/UserPatterns.Paper4.formatted.html","key":"key2022021620204612000_B4"},{"doi-asserted-by":"crossref","unstructured":"Choo, C.W., Detlor, B. and Turnbull, D. (2000), Web Work: Information Seeking and Knowledge Work on the World Wide Web, Kluwer Academic Publishers, Dordrecht.","key":"key2022021620204612000_B5","DOI":"10.1007\/978-94-015-9405-9"},{"unstructured":"Chow, J. (2002), \u201cStatistics show fewer women in IT careers. ITworld.com\u201d, available at: http:\/\/itworld.com\/Career\/1832\/020410itcareers\/page_1.html","key":"key2022021620204612000_B6"},{"doi-asserted-by":"crossref","unstructured":"Cockburn, A. and McKenzie, B. (2001), \u201cWhat do Web users do? An empirical analysis of Web use\u201d, International Journal of Human\u2010Computer Studies, Vol. 54 No. 6, pp. 903\u201022.","key":"key2022021620204612000_B7","DOI":"10.1006\/ijhc.2001.0459"},{"doi-asserted-by":"crossref","unstructured":"Cothey, V. (2002), \u201cA longitudinal study of World Wide Web users\u2019 information\u2010searching behavior\u201d, Journal of American Society for Information Science & Technology, Vol. 53 No. 2, pp. 67\u201078.","key":"key2022021620204612000_B8","DOI":"10.1002\/asi.10011"},{"doi-asserted-by":"crossref","unstructured":"Ellis, D. (1989), \u201cA behavioural model for information retrieval system design\u201d, Journal of Information Science, Vol. 15 No. 4\/5, pp. 237\u201047.","key":"key2022021620204612000_B9","DOI":"10.1177\/016555158901500406"},{"doi-asserted-by":"crossref","unstructured":"Ellis, D. and Haugan, M. (1997), \u201cModelling the information seeking patterns of engineers and research scientists in an industrial environment\u201d, Journal of Documentation, Vol. 53 No. 4, pp. 384\u2010403.","key":"key2022021620204612000_B10","DOI":"10.1108\/EUM0000000007204"},{"doi-asserted-by":"crossref","unstructured":"Ellis, D., Cox, D. and Hall, K. (1993), \u201cA comparison of the information seeking patterns of researchers in the physical and social sciences\u201d, Journal of Documentation, Vol. 49 No. 4, pp. 356\u201069.","key":"key2022021620204612000_B11","DOI":"10.1108\/eb026919"},{"doi-asserted-by":"crossref","unstructured":"H\u00f6lscher, C. and Strube, G. (2000), \u201cWeb search behavior of Internet experts and newbies\u201d, Computer Networks, Vol. 33 No. 1\u20106, pp. 337\u201046.","key":"key2022021620204612000_B12","DOI":"10.1016\/S1389-1286(00)00031-1"},{"unstructured":"Howard, J.A. and Hollander, J.A. (1997), Gendered Situations, Gendered Selves: A Gender Lens on Social Psychology, Sage Publications, Thousand Oaks, CA.","key":"key2022021620204612000_B13"},{"doi-asserted-by":"crossref","unstructured":"Huberman, B.A., Pirolli, P.L., Pitkow, J.E. and Lukose, R.M. (1998), \u201cStrong regularities in World Wide Web surfing\u201d, Science, Vol. 280 No. 5360.","key":"key2022021620204612000_B14","DOI":"10.1126\/science.280.5360.95"},{"doi-asserted-by":"crossref","unstructured":"Jansen, B.J., Spink, A. and Saracevic, T. (2000), \u201cReal life, real users, and real needs: a study and analysis of user queries on the Web\u201d, Information Processing & Management, Vol. 36 No. 2, pp. 207\u201028.","key":"key2022021620204612000_B15","DOI":"10.1016\/S0306-4573(99)00056-4"},{"doi-asserted-by":"crossref","unstructured":"Kim, K.\u2010S. and Allen, B. (2002), \u201cCognitive and task influences on Web searching behavior\u201d, Journal of American Society for Information Science & Technology, Vol. 53 No. 2, pp. 109\u201019.","key":"key2022021620204612000_B16","DOI":"10.1002\/asi.10014"},{"doi-asserted-by":"crossref","unstructured":"Marchionini, G.M. (1995), Information Seeking in Electronic Environments, Cambridge University Press, Cambridge.","key":"key2022021620204612000_B17","DOI":"10.1017\/CBO9780511626388"},{"unstructured":"Margolis, J. and Fisher, A. (2002), Unlocking the Clubhouse: Women in Computing, MIT Press, Cambridge, MA.","key":"key2022021620204612000_B18"},{"doi-asserted-by":"crossref","unstructured":"Spender, D. (1995), Nattering on the Net: Women, Power and Cyberspace, Garamond Press, Toronto.","key":"key2022021620204612000_B19","DOI":"10.3138\/9781442602762"},{"doi-asserted-by":"crossref","unstructured":"Tauscher, L. and Greenberg, S. (1997a), \u201cHow people revisit Web pages: empirical findings and implications for the design of history systems\u201d, International Journal of Human\u2010Computer Studies, Vol. 47, pp. 97\u2010137.","key":"key2022021620204612000_B20","DOI":"10.1006\/ijhc.1997.0125"},{"doi-asserted-by":"crossref","unstructured":"Tauscher, L. and Greenberg, S. (1997b), \u201cRevisitation patterns in World Wide Web navigation\u201d, in Pemberton, S. (Ed.), CHI 97 Human Factors in Computing Systems, CHI 97, Atlanta, GA, pp. 399\u2010406.","key":"key2022021620204612000_B21","DOI":"10.1145\/258549.258816"},{"doi-asserted-by":"crossref","unstructured":"Weick, K.E. and Daft, R.L. (1983), \u201cThe effectiveness of interpretation systems\u201d, in Cameron, K.S. and Whetten, D.A. (Eds), Organizational Effectiveness: A Comparison of Multiple Models, Academic Press, New York, NY, pp. 71\u201093.","key":"key2022021620204612000_B22","DOI":"10.1016\/B978-0-12-157180-1.50009-4"},{"doi-asserted-by":"crossref","unstructured":"Wilson, T.D. (1997), \u201cInformation behaviour: an interdisciplinary perspective\u201d, Information Processing & Management, Vol. 33 No. 4, pp. 551\u201072.","key":"key2022021620204612000_B23","DOI":"10.1016\/S0306-4573(97)00028-9"},{"unstructured":"Choo, C.W., Detlor, B. and Turnbull, D. (2000), \u201cWorking the Web: an empirical model of Web use\u201d, presented at the 33rd Hawaii International Conference on Systems Science, Mauai, HI.","key":"key2022021620204612000_B24"},{"doi-asserted-by":"crossref","unstructured":"Daft, R.L. and Weick, K.E. (1984), \u201cToward a model of organizations as interpretation systems\u201d, Academy of Management Review, Vol. 9 No. 2, pp. 284\u201095.","key":"key2022021620204612000_B25","DOI":"10.5465\/amr.1984.4277657"},{"unstructured":"Furger, R. (1998), Does Jane Compute? Preserving Our Daughters\u2019 Place in the Cyber Revolution, Warner Books, New York, NY.","key":"key2022021620204612000_B26"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662240310488951","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240310488951\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240310488951\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:39:56Z","timestamp":1753400396000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/13\/4\/267-280\/186323"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,10,1]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2003,10,1]]}},"alternative-id":["10.1108\/10662240310488951"],"URL":"https:\/\/doi.org\/10.1108\/10662240310488951","relation":{},"ISSN":["1066-2243"],"issn-type":[{"type":"print","value":"1066-2243"}],"subject":[],"published":{"date-parts":[[2003,10,1]]}}}