{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:43:02Z","timestamp":1773247382017,"version":"3.50.1"},"reference-count":34,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2019,3,6]],"date-time":"2019-03-06T00:00:00Z","timestamp":1551830400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JD"],"published-print":{"date-parts":[[2019,3,6]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>For digital libraries, it is useful to understand how users search in a collection. Investigating search patterns can help them to improve the user interface, collection management and search algorithms. However, search patterns may vary widely in different parts of a collection. The purpose of this paper is to demonstrate how to identify these search patterns within a well-curated historical newspaper collection using the existing metadata.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>The authors analyzed search logs combined with metadata records describing the content of the collection, using this metadata to create subsets in the logs corresponding to different parts of the collection.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The study shows that faceted search is more prevalent than non-faceted search in terms of number of unique queries, time spent, clicks and downloads. Distinct search patterns are observed in different parts of the collection, corresponding to historical periods, geographical regions or subject matter.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>First, this study provides deeper insights into search behavior at a fine granularity in a historical newspaper collection, by the inclusion of the metadata in the analysis. Second, it demonstrates how to use metadata categorization as a way to analyze distinct search patterns in a collection.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jd-06-2018-0087","type":"journal-article","created":{"date-parts":[[2018,12,10]],"date-time":"2018-12-10T07:46:46Z","timestamp":1544428006000},"page":"270-286","source":"Crossref","is-referenced-by-count":15,"title":["Metadata categorization for identifying search patterns in a digital library"],"prefix":"10.1108","volume":"75","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5049-9386","authenticated-orcid":false,"given":"Tessel","family":"Bogaard","sequence":"first","affiliation":[]},{"given":"Laura","family":"Hollink","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Wielemaker","sequence":"additional","affiliation":[]},{"given":"Jacco","family":"van Ossenbruggen","sequence":"additional","affiliation":[]},{"given":"Lynda","family":"Hardman","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020092419290085700_ref001","doi-asserted-by":"crossref","unstructured":"Agichtein, E., White, R.W., Dumais, S.T. and Bennett, P.N. (2012), \u201cSearch, interrupted: understanding and predicting search task continuation\u201d, in Hersh, W.R., Callan, J., Maarek, Y. and Sanderson, M. (Eds), The 35th International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR \u201812, ACM, Portland, OR, August 12\u201316, pp. 315-324.","DOI":"10.1145\/2348283.2348328"},{"key":"key2020092419290085700_ref002","unstructured":"Baeza-Yates, R., Hurtado, C. and Mendoza, M. (2005), \u201cQuery recommendation using query logs in search engines\u201d, in Lindner, W., Mesiti, M., T\u00fcrker, C., Tzitzikas, Y. and Vakali, A.I. (Eds), Current Trends in Database Technology \u2013 EDBT 2004 Workshops: EDBT 2004 Workshops PhD, DataX, PIM, P2P&DB, and ClustWeb, Heraklion, Crete, Greece, Springer, Berlin and Heidelberg, March 14\u201318, pp. 588-596."},{"key":"key2020092419290085700_ref003","doi-asserted-by":"crossref","unstructured":"Beitzel, S.M., Jensen, E.C., Chowdhury, A., Grossman, D.A. and Frieder, O. (2004), \u201cHourly analysis of a very large topically categorized web query log\u201d, in Sanderson, M., J\u00e4rvelin, K., Allan, J. and Bruza, P. (Eds), SIGIR 2004: Proceedings of the 27th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, ACM, Sheffield, July 25\u201329, pp. 321-328.","DOI":"10.1145\/1008992.1009048"},{"key":"key2020092419290085700_ref004","doi-asserted-by":"crossref","unstructured":"Bogaard, T., Wielemaker, J., Hollink, L. and van Ossenbruggen, J. (2017), \u201cSwish DataLab: a web interface for data exploration and analysis\u201d, in Bosse, T. and Bredeweg, B. (Eds), BNAIC 2016: Artificial Intelligence, Springer International Publishing, Cham, pp. 181-187.","DOI":"10.1007\/978-3-319-67468-1_13"},{"issue":"8","key":"key2020092419290085700_ref005","doi-asserted-by":"crossref","first-page":"e204","DOI":"10.2196\/jmir.4427","article-title":"Analyzing information seeking and drug-safety alert response by health care professionals as new methods for surveillance","volume":"17","year":"2015","journal-title":"Journal of Medical Internet Research"},{"issue":"6","key":"key2020092419290085700_ref006","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1016\/0169-7552(95)00043-7","article-title":"Characterizing browsing strategies in the world-wide web","volume":"27","year":"1995","journal-title":"Computer Networks and ISDN Systems"},{"key":"key2020092419290085700_ref007","first-page":"1","article-title":"A dynamic Bayesian network click model for web search ranking","year":"2009"},{"key":"key2020092419290085700_ref008","doi-asserted-by":"crossref","unstructured":"Clough, P.D., Hill, T., Paramita, M.L. and Goodale, P. (2017), \u201cEuropeana: what users search for and why\u201d, in Kamps, J., Tsakonas, G., Manolopoulos, Y., Iliadis, L.S. and Karydis, I. (Eds), Research and Advanced Technology for Digital Libraries \u2013 21st International Conference on Theory and Practice of Digital Libraries, TPDL 2017, Proceedings, volume 10450 of Lecture Notes in Computer Science, Springer, Thessaloniki, September 18\u201321, pp. 207-219.","DOI":"10.1007\/978-3-319-67008-9_17"},{"issue":"4","key":"key2020092419290085700_ref009","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1409220.1409222","article-title":"A survey of query log privacy-enhancing techniques from a policy perspective","volume":"2","year":"2008","journal-title":"ACM Transactions on the Web"},{"issue":"1","key":"key2020092419290085700_ref010","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1177\/0165551512469765","article-title":"Investigating the information-seeking behaviour of genealogists and family historians","volume":"39","year":"2013","journal-title":"Journal of Information Science"},{"key":"key2020092419290085700_ref011","first-page":"2740","article-title":"Models of searching and browsing: languages, studies, and applications","year":"2007"},{"key":"key2020092419290085700_ref012","doi-asserted-by":"crossref","unstructured":"Dwork, C. (2006), \u201cDifferential privacy\u201d, in Bugliesi, M., Preneel, B., Sassone, V. and Wegener, I. (Eds), Automata, Languages and Programming: 33rd International Colloquium: ICALP 2006, Venice, Italy, Proceedings, Part II, Springer, Berlin and Heidelberg, July 10\u201314, pp. 1-12.","DOI":"10.1007\/11787006_1"},{"key":"key2020092419290085700_ref013","first-page":"223","article-title":"Lessons from the journey: a query log analysis of within-session learning","year":"2014"},{"issue":"2","key":"key2020092419290085700_ref014","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1108\/JD-10-2014-0149","article-title":"Exploring the information behaviour of users of Welsh newspapers online through web log analysis","volume":"72","year":"2016","journal-title":"Journal of Documentation"},{"key":"key2020092419290085700_ref015","first-page":"124","article-title":"Efficient multiple-click models in web search","year":"2009"},{"issue":"4","key":"key2020092419290085700_ref016","first-page":"477","article-title":"An exploration of search session patterns in an image-based digital library","volume":"42","year":"2015","journal-title":"Journal of Information Science"},{"issue":"9","key":"key2020092419290085700_ref017","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/567498.567525","article-title":"Finding the flow in web site search","volume":"45","year":"2002","journal-title":"Communications of the ACM"},{"key":"key2020092419290085700_ref018","unstructured":"Hoaglin, D.C. (1983), \u201cLetter values: a set of selected order statistics\u201d, in Hoaglin, D.C., Mosteller, F. and Tukey, J.W. (Eds), Understanding Robust and Exploratory Data Analysis, Chapter 2, Wiley, New York, NY, pp. 33-57."},{"issue":"4","key":"key2020092419290085700_ref019","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1002\/asi.21484","article-title":"Semantic search log analysis: a method and a study on professional image search","volume":"62","year":"2011","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"5","key":"key2020092419290085700_ref020","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1109\/TDSC.2014.2369034","article-title":"Collaborative search log sanitization: toward differential privacy and boosted utility","volume":"12","year":"2015","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"6","key":"key2020092419290085700_ref021","doi-asserted-by":"crossref","first-page":"1180","DOI":"10.1002\/asi.21327","article-title":"Search behavior of media professionals at an audiovisual archive: a transaction log analysis","volume":"61","year":"2010","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"1","key":"key2020092419290085700_ref022","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1016\/j.ipm.2004.10.007","article-title":"How are we searching the World Wide Web? A comparison of nine search engine transaction logs","volume":"42","year":"2006","journal-title":"Information Processing and Management"},{"key":"key2020092419290085700_ref023","doi-asserted-by":"crossref","unstructured":"Jones, R. and Klinkner, K.L. (2008), \u201cBeyond the session timeout: automatic hierarchical segmentation of search topics in query logs\u201d, in Shanahan, J.G., Amer-Yahia, S., Manolescu, I., Zhang, Y., Evans, D.A., Kolcz, A., Choi, K. and Chowdhury, A. (Eds), Proceedings of the 17th ACM Conference on Information and Knowledge Management, CIKM 2008, ACM, Napa Valley, CA, October 26\u201330, pp. 699-708.","DOI":"10.1145\/1458082.1458176"},{"key":"key2020092419290085700_ref024","first-page":"853","article-title":"Vanity fair: privacy in querylog bundles","year":"2008"},{"issue":"2","key":"key2020092419290085700_ref025","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/s007999900022","article-title":"A transaction log analysis of a digital library","volume":"3","year":"2000","journal-title":"International Journal on Digital Libraries"},{"issue":"3","key":"key2020092419290085700_ref026","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/S0740-8188(02)00126-3","article-title":"Exploring behavior of e-journal users in science and technology: transaction log analysis of Elsevier\u2019s ScienceDirect onsite in Taiwan","volume":"24","year":"2002","journal-title":"Library & Information Science Research"},{"key":"key2020092419290085700_ref027","first-page":"171","article-title":"Releasing search queries and clicks privately","year":"2009"},{"key":"key2020092419290085700_ref028","doi-asserted-by":"crossref","unstructured":"Mahoui, M. and Cunningham, S.J. (2001), \u201cSearch behavior in a research-oriented digital library\u201d, in Constantopoulos, P. and S\u00f8lvberg, I. (Eds), Research and Advanced Technology for Digital Libraries, 5th European Conference, ECDL 2001, Proceedings, volume 2163 of Lecture Notes in Computer Science, Springer, Darmstadt, September 4\u20139, pp. 13-24.","DOI":"10.1007\/3-540-44796-2_2"},{"issue":"5","key":"key2020092419290085700_ref029","first-page":"1030","article-title":"Analyzing the interaction patterns in a faceted search interface","volume":"66","year":"2015","journal-title":"JASIST"},{"key":"key2020092419290085700_ref030","doi-asserted-by":"crossref","unstructured":"Sfakakis, M. and Kapidakis, S. (2002), \u201cUser behavior tendencies on data collections in a digital library\u201d, in Agosti, M. and Thanos, C. (Eds), Research and Advanced Technology for Digital Libraries: 6th European Conference, ECDL 2002, Rome, Proceedings, Springer Berlin Heidelberg, Berlin, Heidelberg, September 16-18, pp. 550-559.","DOI":"10.1007\/3-540-45747-X_41"},{"key":"key2020092419290085700_ref031","volume-title":"Web Search: Public Searching of the Web","year":"2004"},{"issue":"12","key":"key2020092419290085700_ref032","doi-asserted-by":"crossref","first-page":"2492","DOI":"10.1002\/asi.22945","article-title":"Investigating religious information searching through analysis of a search engine log","volume":"64","year":"2013","journal-title":"JASIST"},{"key":"key2020092419290085700_ref033","doi-asserted-by":"crossref","unstructured":"Wang, G., Zhang, X., Tang, S., Zheng, H. and Zhao, B.Y. (2016), \u201cUnsupervised clickstream clustering for user behavior analysis\u201d, in Druin, A., Lampe, C., Morris, D., Hourcade, J.P. and Kaye, J. (Eds), Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, ACM, San Jose, CA, May 7\u201312, pp. 225-236.","DOI":"10.1145\/2858036.2858107"},{"key":"key2020092419290085700_ref034","first-page":"753","article-title":"Anonymizing query logs by differential privacy","year":"2016"}],"container-title":["Journal of Documentation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JD-06-2018-0087\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JD-06-2018-0087\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:34:16Z","timestamp":1753396456000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jd\/article\/75\/2\/270-286\/214645"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,6]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,3,6]]}},"alternative-id":["10.1108\/JD-06-2018-0087"],"URL":"https:\/\/doi.org\/10.1108\/jd-06-2018-0087","relation":{},"ISSN":["0022-0418"],"issn-type":[{"value":"0022-0418","type":"print"}],"subject":[],"published":{"date-parts":[[2019,3,6]]}}}