{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T18:57:15Z","timestamp":1768589835638,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,13]],"date-time":"2016-03-13T00:00:00Z","timestamp":1457827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,13]]},"DOI":"10.1145\/2854946.2854969","type":"proceedings-article","created":{"date-parts":[[2016,3,14]],"date-time":"2016-03-14T15:33:45Z","timestamp":1457969625000},"page":"193-202","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["How Writers Search"],"prefix":"10.1145","author":[{"given":"Matthias","family":"Hagen","sequence":"first","affiliation":[{"name":"Bauhaus-Universit\u00e4t Weimar, Weimar, Germany"}]},{"given":"Martin","family":"Potthast","sequence":"additional","affiliation":[{"name":"Bauhaus-Universit\u00e4t Weimar, Weimar, Germany"}]},{"given":"Michael","family":"V\u00f6lske","sequence":"additional","affiliation":[{"name":"Bauhaus-Universit\u00e4t Weimar, Weimar, Germany"}]},{"given":"Jakob","family":"Gomoll","sequence":"additional","affiliation":[{"name":"Bauhaus-Universit\u00e4t Weimar, Weimar, Germany"}]},{"given":"Benno","family":"Stein","sequence":"additional","affiliation":[{"name":"Bauhaus-Universit\u00e4t Weimar, Weimar, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148175"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348328"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06028-6_8"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639729"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348312"},{"key":"e_1_3_2_1_6_1","volume-title":"The ClueWeb09","author":"Callan J.","unstructured":"J. Callan , M. Hoy , C. Yoo , and L. Zhao . The ClueWeb09 . J. Callan, M. Hoy, C. Yoo, and L. Zhao. The ClueWeb09."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526736"},{"key":"e_1_3_2_1_8_1","volume-title":"Read better, read faster","author":"De Leeuw M.","year":"1965","unstructured":"M. De Leeuw and E. De Leeuw . Read better, read faster . Penguin Books , 1965 . M. De Leeuw and E. De Leeuw. Read better, read faster. Penguin Books, 1965."},{"key":"e_1_3_2_1_9_1","first-page":"61","article-title":"From the mind's eye of the user: The sense-making qualitative-quantitative methodology","volume":"9","author":"Dervin B.","year":"1992","unstructured":"B. Dervin . From the mind's eye of the user: The sense-making qualitative-quantitative methodology . In Qual. Res. in Inf. Managm. , 9 : 61 -- 84 , 1992 . B. Dervin. From the mind's eye of the user: The sense-making qualitative-quantitative methodology. In Qual. Res. in Inf. Managm., 9: 61--84, 1992.","journal-title":"Qual. Res. in Inf. Managm."},{"key":"e_1_3_2_1_10_1","first-page":"121","article-title":"Query expansion","volume":"31","author":"Efthimiadis E.","year":"1996","unstructured":"E. Efthimiadis . Query expansion . ARIST , 31 : 121 -- 187 , 1996 . E. Efthimiadis. Query expansion. ARIST, 31: 121--187, 1996.","journal-title":"ARIST"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1840784.1840810"},{"key":"e_1_3_2_1_12_1","first-page":"85","article-title":"From search session detection to search mission detection","author":"Hagen M.","year":"2013","unstructured":"M. Hagen , J. Gomoll , A. Beyer , and B. Stein . From search session detection to search mission detection . In OAIR 2013 , pp. 85 -- 92 . M. Hagen, J. Gomoll, A. Beyer, and B. Stein. From search session detection to search mission detection. In OAIR 2013, pp. 85--92.","journal-title":"OAIR"},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"Handbook of Res. on Web Log Analysis","author":"Jansen B.","year":"2008","unstructured":"B. Jansen , A. Spink , and I. Taksa . Research and methodological foundations of transaction log analysis . In Handbook of Res. on Web Log Analysis , pp. 1 -- 16 , 2008 . B. Jansen, A. Spink, and I. Taksa. Research and methodological foundations of transaction log analysis. In Handbook of Res. on Web Log Analysis, pp. 1--16, 2008."},{"key":"e_1_3_2_1_14_1","volume-title":"Information seeking research needs extension towards tasks and technology. Information Research, 10 (1)","author":"J\u00e4rvelin K.","year":"2004","unstructured":"K. J\u00e4rvelin and P. Ingwersen . Information seeking research needs extension towards tasks and technology. Information Research, 10 (1) , 2004 . K. J\u00e4rvelin and P. Ingwersen. Information seeking research needs extension towards tasks and technology. Information Research, 10 (1), 2004."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb047888"},{"issue":"1","key":"e_1_3_2_1_16_1","first-page":"1","article-title":"Searching vs. writing: Factors affecting information use task performance","volume":"49","author":"Liu J.","year":"2012","unstructured":"J. Liu and N. Belkin . Searching vs. writing: Factors affecting information use task performance . ASIST , 49 ( 1 ): 1 -- 10 , 2012 . J. Liu and N. Belkin. Searching vs. writing: Factors affecting information use task performance. ASIST, 49 (1): 1--10, 2012.","journal-title":"ASIST"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1121949.1121979"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v59:6"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v61:1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348290"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348429"},{"key":"e_1_3_2_1_22_1","first-page":"1212","volume-title":"ACL","author":"Potthast M.","year":"2013","unstructured":"M. Potthast , M. Hagen , M. V\u00f6lske , and B. Stein . Crowdsourcing interaction logs to understand text reuse from the web . In ACL 2013 , pp. 1212 -- 1221 . M. Potthast, M. Hagen, M. V\u00f6lske, and B. Stein. Crowdsourcing interaction logs to understand text reuse from the web. In ACL 2013, pp. 1212--1221."},{"key":"e_1_3_2_1_23_1","first-page":"11","volume-title":"EuroHCIR","author":"Potthast M.","year":"2013","unstructured":"M. Potthast , M. Hagen , M. V\u00f6lske , and B. Stein . Exploratory search missions for TREC topics . In EuroHCIR 2013 , pp. 11 -- 14 . M. Potthast, M. Hagen, M. V\u00f6lske, and B. Stein. Exploratory search missions for TREC topics. In EuroHCIR 2013, pp. 11--14."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2007.09.006"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031171.1031181"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/164632.164922"},{"key":"e_1_3_2_1_27_1","volume-title":"A method for the analysis of information use in source-based writing. Information Research, 17 (4): paper 535","author":"Sormunen E.","year":"2012","unstructured":"E. Sormunen , J. Heinstr\u00f6m , L. Romu , and R. Turunen . A method for the analysis of information use in source-based writing. Information Research, 17 (4): paper 535 , 2012 . E. Sormunen, J. Heinstr\u00f6m, L. Romu, and R. Turunen. A method for the analysis of information use in source-based writing. Information Research, 17 (4): paper 535, 2012."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063910"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633041"},{"key":"e_1_3_2_1_30_1","first-page":"24","volume-title":"HCIR","author":"Vakkari P.","year":"2010","unstructured":"P. Vakkari . Exploratory searching as conceptual exploration . In HCIR 2010 , pp. 24 -- 27 . P. Vakkari. Exploratory searching as conceptual exploration. In HCIR 2010, pp. 24--27."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21683"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2006.06.005"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1521589"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1121949.1121978"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2007.09.011"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/333135.333138"}],"event":{"name":"CHIIR '16: Conference on Human Information Interaction and Retrieval","location":"Carrboro North Carolina USA","acronym":"CHIIR '16","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2016 ACM on Conference on Human Information Interaction and Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2854946.2854969","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2854946.2854969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:47Z","timestamp":1750225727000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2854946.2854969"}},"subtitle":["Analyzing the Search and Writing Logs of Non-fictional Essays"],"short-title":[],"issued":{"date-parts":[[2016,3,13]]},"references-count":36,"alternative-id":["10.1145\/2854946.2854969","10.1145\/2854946"],"URL":"https:\/\/doi.org\/10.1145\/2854946.2854969","relation":{},"subject":[],"published":{"date-parts":[[2016,3,13]]},"assertion":[{"value":"2016-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}