Usage and impact of controlled vocabularies in a subject repository for indexing and retrieval



Similar documents
W3Perl A free logfile analyzer

Building Views and Charts in Requests Introduction to Answers views and charts Creating and editing charts Performing common view tasks

Google Analytics for Robust Website Analytics. Deepika Verma, Depanwita Seal, Atul Pandey

Bandwidth consumption: Adaptive Defense and Adaptive Defense 360

Nagios Web Service Checker

Taking Libraries Cultural Content to the User Approaches and Experiences from the EEXCESS Project

CiteSeer x in the Cloud

1 Energy Data Problem Domain. 2 Getting Started with ESPER. 2.1 Experimental Setup. Diogo Anjos José Cavalheiro Paulo Carreira

The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

Secure Traffic Inspection

CGI::Auto Automatic Web-Service Creation

Microsoft Enterprise Search for IT Professionals Course 10802A; 3 Days, Instructor-led

Technical Guide for Remote access

Bibliometrics and Transaction Log Analysis. Bibliometrics Citation Analysis Transaction Log Analysis

WLAN TRAFFIC GRAPHING APPLICATION USING SIMPLE NETWORK MANAGEMENT PROTOCOL *

Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)

Gatekeeper Systems Mobile Work Orders System (MWO)

Installation Guide NetIQ AppManager

Taylor & Francis ebooks Online User Guide

Opacus Outlook Addin v3.x User Guide

Augmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence

Intrusion Detection System using Log Files and Reinforcement Learning

How to FTP (How to upload files on a web-server)

Easy configuration of NETCONF devices

Preparing Internet Explorer 7 & 8 for erequest & estores

How To Create An Integrated Visualization For A Network Security System (For A Free Download)

DiskPulse DISK CHANGE MONITOR

Internet Advertising Glossary Internet Advertising Glossary

StreamServe Persuasion SP5 Microsoft SQL Server

Secure Web Appliance. SSL Intercept

PROGRAMMING FOR BIOLOGISTS. BIOL 6297 Monday, Wednesday 10 am -12 pm

XML. CIS-3152, Spring 2013 Peter C. Chapin

Using Log Files to Assess Web-Enabled Information System Usage

Hypertable Architecture Overview

What s new in ProactiveWatch 2.1!

Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.

Functional Requirements for Digital Asset Management Project version /30/2006

Using RADIUS Agent for Transparent User Identification

Unifying Search for the Desktop, the Enterprise and the Web

COURSE SYLLABUS COURSE TITLE:

What's New in SAS Data Management

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

10. Exercise: Automation in Incident Handling

MS Enterprise Library 5.0 (Logging Application Block)

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Firewall Builder Architecture Overview

Oracle BI 11g R1: Build Repositories

Crawl Proxy Installation and Configuration Guide

@MIRE. DSpace 1.6 usage statistics: How does it work? Ben Bosman

Measuring impact revisited

Rational Software. Getting Started with Rational Customer Service Online Case Management. Release 1.0

Elgg 1.8 Social Networking

Web Application Hosting Cloud Architecture

Threat Advisory: Accellion File Transfer Appliance Vulnerability

User Management Tool 1.6

Dr. Anuradha et al. / International Journal on Computer Science and Engineering (IJCSE)

Windows Azure: Cloud Reader

A SURVEY ON WEB MINING TOOLS

126 SW 148 th Street Suite C-100, #105 Seattle, WA Tel: Fax:

How To Upgrade To Symantec Mail Security Appliance 7.5.5

Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

How to use the UNIX commands for incident handling. June 12, 2013 Koichiro (Sparky) Komiyama Sam Sasaki JPCERT Coordination Center, Japan

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

Solutions to Trust. NEXThink V5 What is New?

Test Automation Integration with Test Management QAComplete

Using Open Source software and Open data to support Clinical Trial Protocol design

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

PATROL From a Database Administrator s Perspective

TMA Management Suite. For EAD and TDM products. ABOUT OneAccess. Value-Adding Software Licenses TMA

This document presents the new features available in ngklast release 4.4 and KServer 4.2.

Augmented Search for Software Testing

The New RERO Statistics Services

DC Agent Troubleshooting

Course Descriptions. CS 101 Intro to Computer Science

SAS IT Resource Management 3.2

Ontario Woodlot Association

File Share Navigator Online 1

Partek Flow Installation Guide

SmarterStats vs. Google Analytics

Microsoft FAST Search Server 2010 for SharePoint Evaluation Guide

Next Generation IPS and Reputation Services

EnterpriseLink Benefits

QUESTION: 1 Which of the following are valid authentication user group types on a FortiGate unit? (Select all that apply.)

DIABLO VALLEY COLLEGE CATALOG

Installation & User Guide

Configuring MailArchiva with Insight Server

Step by Step. Use the Cloud Login Website

Lab Conducting a Network Capture with Wireshark

Glyma Deployment Instructions

FileMaker Server 10 Help

Windchill Service Information Manager Curriculum Guide

IBM i Version 7.2. Systems management Advanced job scheduler

Sisense. Product Highlights.

Adam Rauch Partner, LabKey Software Extending LabKey Server Part 1: Retrieving and Presenting Data

Administration Guide NetIQ Privileged Account Manager 3.0.1

Enabling Office 365 Services

TRIM: Web Tool. Web Address The TRIM web tool can be accessed at:

Transcription:

Usage and impact of controlled vocabularies in a subject repository for indexing and retrieval Dr. Timo Borst LIBER 2011 Barcelona 29.6.-2.7.2011 ZBW is member of the Leibniz Association

Overview 1. Terminology webservices as a means for supporting retrieval in the realm of library applications 2. Logfile analysis as an approach for analysing users search behaviour 3. Results 4. Conclusions and suggestions for improving search interfaces Seite 2

Terminology webservices General idea: Provide a framework for integrating authority data, which is both normative and flexible enough to tolerate local idiosyncrasies on a string level. Approach: Concept modelling based on Semantic Web / SKOS standards (for concepts, persons, institutions, ) Seite 3

Terminology webservices Architecture Seite 4

Terminology webservices Terminology? STW Thesaurus for Economics, http://zbw.eu/stw/versions/latest/about.en.html More than 6,000 standardized subject headings and 18,000 entry terms Contains concepts from Economics and Business Research, but also from law, sociology and politics Part of the Semantic Web and the LOD cloud Integrated into our own retrieval applications, downloaded from many institutions Seite 5

Terminology webservices How does it work? Seite 6

Logfile analysis Many approaches to analysis of user behaviour (logfile analysis, real-time tracking, usability studies, questionnaires ) To us, logfiles serve as a basis for analysing string patterns in queries, hence search behaviour on a linguistic level Basic idea: each user request is logged in a standardized way, e.g. by a web server Query strings are automatically processed and analysed e.g. through scripts (PERL), regexp or UNIX Shell commands (grep, sed, awk, ) Seite 7

Logfile analysis Pros Cons + Automatic generation and persistence of logfiles + Canbeprocessedat anytime by different tools + Filtering of robots, crawlers etc. possible - Access through proxies and browser caches -> no user identification and counting possible - Sometimes restricted to data privacy rules (e.g., no IP tracking allowed) - No real-time processing Seite 8

Logfile analysis To be investigated: 1. What is the current rate of search queries with controlled vocabulary? 2. What is the potential mapping of uncontrolled search terms to controlled vocabulary? 3. How does the use of controlled vocabulary affect document views? Seite 9

Results What is the current rate of search queries with controlled vocabulary (JEL, STW terms by autosuggest and search term expansion with/without scrolling)? rate of controlled queries 12% STW terms 14% JEL terms STW expansion terms STW expansion terms (scrolled) non-controlled 6% 67% 1% Seite 10

Results What is the potential mapping of uncontrolled search terms to controlled vocabulary (internal search)?* potential for controlled queries / internal search 15% 18% matching terms non-matching terms other *approach: Running search terms against Lucene/SOLRindex of STW terms with stemming 67% Seite 11

Results How does the use of controlled vocabulary affect document views (Google search)?* potential for controlled queries / Google search 18% 13% 69% matching terms non-matching terms other *approach: Running search terms against Lucene/SOLRindex of STW terms with stemming Seite 12

Conclusions and suggestions for improving search interfaces (I) Significant use of and potential for controlled vocabulary if the vocabulary is big enough and constantly maintained Significant rate of uncontrolled terms belonging to other-categories like names and document titles how to support this better? Different searches for names according to different roles (e.g. search for (co-)authors, in citations, author information etc.) Suggesting names by authority files Result sets resulting from search term expansion are scrolled quite often how to avoid this? Adding filters Sorting by column Cascading search Seite 13

Conclusions and suggestions for improving search interfaces (II) Mapping of uncontrolled terms to vocabulary still may be further improved by linguistic techniques main goal: convergence between information system s language and user language Uncontrolled internal search (in our repository) and Google search formally do not differ much - what does that mean? Statement: Adaptation to Google text based search is not appropriate for domain specific scientific search. Instead, we do need suggest services based on authority data for terms, names, institutions etc. to better anticipate domain specific queries visible real-time information about other users search behaviour (community building) visualization and navigation of domain specific topics Seite 14

Seite 15

Thank you! Questions? Dr. Timo Borst t.borst@zbw.eu ZBW is member of the Leibniz Association