SlideShare uma empresa Scribd logo
1 de 67
Modeling of Web Users from Web1.0 to Web2.0 Ed H. Chi, Principal Scientist and Area Manager Augmented Social Cognition Area Palo Alto Research Center Image from: http://www.flickr.com/photos/ourcommon/480538715/ 2010-03-20 Utrecht CogModeling
PARC Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2010-03-20 Utrecht CogModeling
PARC Innovation ,[object Object],[object Object],[object Object],[object Object],Graphical User Interface Laser Printing Ethernet Bit-mapped Displays Distributed File Systems Page Description Languages First Commercial Mouse Object-oriented Programming WYSIWYG Editing Distributed Computing VLSI Design Methodologies Optical Storage Client/Server Architecture Device Independent Imaging Cedar Programming Language 2010-03-20 Utrecht CogModeling
How do people navigate? ,[object Object],[object Object],[object Object],[object Object],Utrecht CogModeling 2010-03-20
Ecological Approach ,[object Object],2010-03-20 Utrecht CogModeling Net Knowledge Gained Costs of Interaction MAXIMIZE [ ]
Analogy to Optimal Foraging 2010-03-20 Utrecht CogModeling Information Energy
Information Scent: The Theory ,[object Object],[object Object],2010-03-20 Utrecht CogModeling
Information Scent: The Idea ,[object Object],[object Object],cell patient dose beam new medical treatments procedures Information Need Text snippet Sees Wants 2010-03-20 Utrecht CogModeling
2010-03-20 Utrecht CogModeling i bread j butter sandwich flour Ai  =  Bi  +   WjSji Activation of chunk i Base-level activation of  chunk  i Activation spread from linked chunks  j Activation depends on a base level plus activation spread from associated chunks Bi  = log(  ) Pr( i ) Pr(not  i ) Sji  = log(  ) Pr( j | i ) Pr( j |not  i ) log likelihood of  i  occurring log likelihood of  i  occurring with  j Base level activation reflects log likelihood of events in the world. Strength of spread reflects log likelihood of event cooccurrance
Attacking The Problem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2010-03-20 Utrecht CogModeling
WUFIS: Web User Flow by Information Scent 2010-03-20 Utrecht CogModeling User Information Goal Web site Web Page content links Web user flow  simulation Predicted paths
InfoScent: How does it work? Utrecht CogModeling Start users at page with some goal Flow users through the network Examine user patterns Scent Values: Probabilities of Transition 2010-03-20
InfoScent Simulation Utrecht CogModeling 2 1 2010-03-20 Now with the Scent Matrix, we then perform Spreading Activation. 3 Weight Matrix Query Relevant Docs R = Relevant documents T = Topology matrix Normalize to Probability Scent Matrix
Proximal Cue Words ,[object Object],Utrecht CogModeling Text of the link itself ,[object Object],[object Object],1 2 2010-03-20
Information Cues ,[object Object],[object Object],[object Object],Utrecht CogModeling 3 2010-03-20
Bloodhound Project 2010-03-20 Utrecht CogModeling Starting Point:  www.xerox.com Task: look for “ high end copiers ” OUTPUT usability metrics INPUT
Input Tasks 2010-03-20 Utrecht CogModeling
Stanford CS 2010-03-20 Utrecht CogModeling
ONR 2010-03-20 Utrecht CogModeling
Instrumentation: WebLogger 2010-03-20 Utrecht CogModeling
User Traces 2010-03-20 Utrecht CogModeling
Compare Visitation Distributions ,[object Object],[object Object],2010-03-20 Utrecht CogModeling
Results 2010-03-20 Utrecht CogModeling ,[object Object],[object Object],[object Object],[object Object],Corr. Coeff. Yahoo REI HivInSite Parcweb task 1a 0.7528 0.4701 0.6811 0.7394 task 1b 0.7218 0.4763 0.7885 0.8756 task 2a 0.7489 0.9892 0.6671 0.8930 task 2b 0.8840 0.7073 0.6880 0.8573 task 3a 0.7768 0.7321 0.8835 0.7197 task 3b 0.6973 0.6979 0.5660 0.7123 task 4a 0.9022 0.9415 0.8407 0.8340 task 4b 0.9052 0.7600 0.4634 0.9344
IUNIS: Inferring User Need by Info Scent 2010-03-20 Utrecht CogModeling User Information Goal Web site Web Page content links Web user flow  simulation Observed paths
2010-03-20 Utrecht CogModeling
Evaluation of IUNIS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Utrecht CogModeling 2010-03-20
Evaluation of IUNIS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Utrecht CogModeling 2010-03-20
ScentTrails:  Pre-highlight navigation path ,[object Object],[object Object],Utrecht CogModeling 2010-03-20
Web page with highlighted link anchors 2010-03-20 Partial information goal: “ remote diagnostic  technology” Remainder of  information goal: “ speed >= 75” Utrecht CogModeling 62 copies/min. 92 copies/min.
ScentTrails algorithm ,[object Object],[object Object],[object Object],2010-03-20 Utrecht CogModeling remote diagnostics copiers fax machines other maintenance . . . XC4411 XC5001 XC4411 copier features Features: remote diagnostics . . . digital copiers color copiers back
Results of user study Utrecht CogModeling (times capped at five minutes) 10/12 subjects preferred ScentTrails to both searching and browsing 2010-03-20
ScentIndex 2010-03-20 Utrecht CogModeling Exact Matches in red Associated Entries underlined in red
ScentHighlight User first type search keywords: “anthrax symptoms” Conceptually highlight any relevant passages and keywords Draw user attention 2010-03-20 Utrecht CogModeling
Method 2010-03-20 Utrecht CogModeling
User Study Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],2010-03-20 Utrecht CogModeling
Heuristics 2010-03-20 Utrecht CogModeling Poor heuristic Good heuristic
“ Hints” 2010-03-20 Utrecht CogModeling Solo Cooperative (“good hints”)
Finding a Restaurant ,[object Object],2010-03-20 Utrecht CogModeling
Research Vision Augmented Social Cognition ,[object Object],[object Object],[object Object],[object Object],[object Object],2010-03-20 Utrecht CogModeling
Research Methodology ,[object Object],[object Object],[object Object],[object Object],Utrecht CogModeling 2010-03-20 Characterization Models Prototypes Evaluations
2010-03-20 Utrecht CogModeling Characterization Models Prototypes Evaluations
Two  Sides of Tagging ,[object Object],[object Object],http://edge.org “ science  research cognition” http://www.ted.com/index.php/speakers “ video  people  talks technology”  2010-03-20 Utrecht CogModeling
Using Information Theory to Model Social Tagging [Ed H. Chi, Todd Mytkowicz, ACM Hypertext 2008] Topics Users Documents Decoding 2010-03-20 Utrecht CogModeling Concepts Tags T 1 …T n Encoding Noise
H(Tag) shows saturation in tag usage  2010-03-20 Utrecht CogModeling
H(Doc | Tag), browsability 2010-03-20 Utrecht CogModeling
I ( Doc ;  Tag )  Mutual Information 2010-03-20 Utrecht CogModeling Source: Hypertext 2008 study on del.icio.us (Chi & Mytkowicz)
Raise in avg. tag per bookmark (note parallel the development in increasing # of query words) 2010-03-20 Utrecht CogModeling
2010-03-20 Utrecht CogModeling Characterization Models Prototypes Evaluations
[object Object],[object Object],[object Object],[object Object],Social Tagging Creates Noise 2010-03-20 Utrecht CogModeling
TagSearch:  Use Semantic Analysis to Reduce Noise   http://mrtaggy.com   2010-03-20 Utrecht CogModeling Guide Web Howto Tips Help Tools Tip Tricks Tutorial Tutorials Reference Semantic Similarity Graph
MapReduce Implementation ,[object Object],[object Object],[object Object],2010-03-20 Utrecht CogModeling Tags URLs P(URL|Tag) P(Tag|URL)
Understanding a new area… 2010-03-20 Characterization Models Prototypes Evaluations Utrecht CogModeling
MrTaggy.com:  social search browser with social bookmarks Joint work with  Rowan Nairn, Lawrence Lee Kammerer, Y., Nairn, R., Pirolli, P., and Chi, E. H. 2009. Signpost from the masses: learning effects in an exploratory social tag search browser. In Proceedings of the 27th international Conference on Human Factors in Computing Systems (Boston, MA, USA, April 04 - 09, 2009). CHI '09. ACM, New York, NY, 625-634.  2010-03-20 Utrecht CogModeling
2010-03-20 Utrecht CogModeling
TagSearch Architecture ,[object Object],[object Object],2010-03-20 Utrecht CogModeling
Understanding a new area… 2010-03-20 Characterization Models Prototypes Evaluations Utrecht CogModeling
Baseline Interface 2010-03-20 Utrecht CogModeling
Experiment Design ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2010-03-20 Utrecht CogModeling
Procedure [2 hours] ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2010-03-20 Utrecht CogModeling
Experimental Evauation  [Kammerer et al, CHI2009] ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2010-03-20 Utrecht CogModeling
The Team 2010-03-20 Utrecht CogModeling
Augmented Social Cognition: From Social Foraging to Social Sensemaking Image from: http://www.flickr.com/photos/ourcommon/480538715/ ,[object Object],[object Object],[object Object],[object Object],[object Object],2010-03-20 Utrecht CogModeling
2010-03-20 Utrecht CogModeling
Enhanced Thumbnails Andrew Faulring, Allison Woodruff and Ruth Rosenholtz 2010-03-20 Utrecht CogModeling   enhanced plain
Popout Prism   [ Suh &Woodruff] 2010-03-20 Utrecht CogModeling
Social Search Survey [Brynn Evans, Ed H. Chi, CSCW2008] ,[object Object],[object Object],[object Object],[object Object],2010-03-20 Utrecht CogModeling
TagSearch Exploratory Focus 3 kinds of search 2010-03-20 Utrecht CogModeling navigational transactional 28% 13% You know what you want and where it is You know what you want to do Existing search engines are OK informational 59% You roughly know what you want  but don’t know how to find it Difficult for existing search engines Opportunity

Mais conteúdo relacionado

Semelhante a Using Information Scent to Model Users in Web1.0 and Web2.0

Crick Presentation. Valencia 28_feb_2010
Crick Presentation. Valencia 28_feb_2010Crick Presentation. Valencia 28_feb_2010
Crick Presentation. Valencia 28_feb_2010
Luis Torres-Yepez
 
LyonALMProposal20041018.doc
LyonALMProposal20041018.docLyonALMProposal20041018.doc
LyonALMProposal20041018.doc
butest
 
LyonALMProposal20041018.doc
LyonALMProposal20041018.docLyonALMProposal20041018.doc
LyonALMProposal20041018.doc
butest
 
Transcelerate hackathon 04202020_near final
Transcelerate hackathon 04202020_near finalTranscelerate hackathon 04202020_near final
Transcelerate hackathon 04202020_near final
Ryan Tubbs
 
a Model-driven development methodology for 3D User Interface for Information ...
a Model-driven development methodology for 3D User Interface for Information ...a Model-driven development methodology for 3D User Interface for Information ...
a Model-driven development methodology for 3D User Interface for Information ...
Juan Manuel Gonzalez Calleros
 

Semelhante a Using Information Scent to Model Users in Web1.0 and Web2.0 (20)

Ajit jaokar slides
Ajit jaokar slidesAjit jaokar slides
Ajit jaokar slides
 
IUI 2010: An Informal Summary of the International Conference on Intelligent ...
IUI 2010: An Informal Summary of the International Conference on Intelligent ...IUI 2010: An Informal Summary of the International Conference on Intelligent ...
IUI 2010: An Informal Summary of the International Conference on Intelligent ...
 
Crick Presentation. Valencia 28_feb_2010
Crick Presentation. Valencia 28_feb_2010Crick Presentation. Valencia 28_feb_2010
Crick Presentation. Valencia 28_feb_2010
 
Project On-Science
Project On-ScienceProject On-Science
Project On-Science
 
11 info architecture
11 info architecture11 info architecture
11 info architecture
 
LyonALMProposal20041018.doc
LyonALMProposal20041018.docLyonALMProposal20041018.doc
LyonALMProposal20041018.doc
 
LyonALMProposal20041018.doc
LyonALMProposal20041018.docLyonALMProposal20041018.doc
LyonALMProposal20041018.doc
 
UCIAD overview
UCIAD overviewUCIAD overview
UCIAD overview
 
STOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKET
STOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKETSTOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKET
STOCKSENTIX: A MACHINE LEARNING APPROACH TO STOCKMARKET
 
IRJET- PDF Extraction using Data Mining Techniques
IRJET- PDF Extraction using Data Mining TechniquesIRJET- PDF Extraction using Data Mining Techniques
IRJET- PDF Extraction using Data Mining Techniques
 
Master in Big Data Analytics and Social Mining 20015
Master in Big Data Analytics and Social Mining 20015Master in Big Data Analytics and Social Mining 20015
Master in Big Data Analytics and Social Mining 20015
 
Transcelerate hackathon 04202020_near final
Transcelerate hackathon 04202020_near finalTranscelerate hackathon 04202020_near final
Transcelerate hackathon 04202020_near final
 
Ranking Resources in Folksonomies by Exploiting Semantic and Context-specific...
Ranking Resources in Folksonomies by Exploiting Semantic and Context-specific...Ranking Resources in Folksonomies by Exploiting Semantic and Context-specific...
Ranking Resources in Folksonomies by Exploiting Semantic and Context-specific...
 
PATHS state of the art monitoring report
PATHS state of the art monitoring reportPATHS state of the art monitoring report
PATHS state of the art monitoring report
 
A Context-aware Model for the Analysis of User Interaction and QoE in Mobile ...
A Context-aware Model for the Analysis of User Interaction and QoE in Mobile ...A Context-aware Model for the Analysis of User Interaction and QoE in Mobile ...
A Context-aware Model for the Analysis of User Interaction and QoE in Mobile ...
 
TESTING
TESTINGTESTING
TESTING
 
a Model-driven development methodology for 3D User Interface for Information ...
a Model-driven development methodology for 3D User Interface for Information ...a Model-driven development methodology for 3D User Interface for Information ...
a Model-driven development methodology for 3D User Interface for Information ...
 
Driver Guidelines and Repository Interoperability
Driver Guidelines and Repository InteroperabilityDriver Guidelines and Repository Interoperability
Driver Guidelines and Repository Interoperability
 
GVIS: a framework for graphical mashups of heterogeneous sources to support d...
GVIS: a framework for graphical mashups of heterogeneous sources to support d...GVIS: a framework for graphical mashups of heterogeneous sources to support d...
GVIS: a framework for graphical mashups of heterogeneous sources to support d...
 
IRJET- College Enquiry Chatbot System(DMCE)
IRJET-  	  College Enquiry Chatbot System(DMCE)IRJET-  	  College Enquiry Chatbot System(DMCE)
IRJET- College Enquiry Chatbot System(DMCE)
 

Mais de Ed Chi

2017 10-10 (netflix ml platform meetup) learning item and user representation...
2017 10-10 (netflix ml platform meetup) learning item and user representation...2017 10-10 (netflix ml platform meetup) learning item and user representation...
2017 10-10 (netflix ml platform meetup) learning item and user representation...
Ed Chi
 
Location and Language in Social Media (Stanford Mobi Social Invited Talk)
Location and Language in Social Media (Stanford Mobi Social Invited Talk)Location and Language in Social Media (Stanford Mobi Social Invited Talk)
Location and Language in Social Media (Stanford Mobi Social Invited Talk)
Ed Chi
 
Crowdsourcing using MTurk for HCI research
Crowdsourcing using MTurk for HCI researchCrowdsourcing using MTurk for HCI research
Crowdsourcing using MTurk for HCI research
Ed Chi
 
CIKM 2011 Social Computing Industry Invited Talk
CIKM 2011 Social Computing Industry Invited TalkCIKM 2011 Social Computing Industry Invited Talk
CIKM 2011 Social Computing Industry Invited Talk
Ed Chi
 
WikiSym 2011 Closing Keynote
WikiSym 2011 Closing KeynoteWikiSym 2011 Closing Keynote
WikiSym 2011 Closing Keynote
Ed Chi
 
Large Scale Social Analytics on Wikipedia, Delicious, and Twitter (presented ...
Large Scale Social Analytics on Wikipedia, Delicious, and Twitter (presented ...Large Scale Social Analytics on Wikipedia, Delicious, and Twitter (presented ...
Large Scale Social Analytics on Wikipedia, Delicious, and Twitter (presented ...
Ed Chi
 
Zerozero88 Twitter URL Item Recommender
Zerozero88 Twitter URL Item RecommenderZerozero88 Twitter URL Item Recommender
Zerozero88 Twitter URL Item Recommender
Ed Chi
 
ASC Disaster Response Proposal from Aug 2007
ASC Disaster Response Proposal from Aug 2007ASC Disaster Response Proposal from Aug 2007
ASC Disaster Response Proposal from Aug 2007
Ed Chi
 

Mais de Ed Chi (20)

2017 10-10 (netflix ml platform meetup) learning item and user representation...
2017 10-10 (netflix ml platform meetup) learning item and user representation...2017 10-10 (netflix ml platform meetup) learning item and user representation...
2017 10-10 (netflix ml platform meetup) learning item and user representation...
 
HCI Korea 2012 Keynote Talk on Model-Driven Research in Social Computing
HCI Korea 2012 Keynote Talk on Model-Driven Research in Social ComputingHCI Korea 2012 Keynote Talk on Model-Driven Research in Social Computing
HCI Korea 2012 Keynote Talk on Model-Driven Research in Social Computing
 
Location and Language in Social Media (Stanford Mobi Social Invited Talk)
Location and Language in Social Media (Stanford Mobi Social Invited Talk)Location and Language in Social Media (Stanford Mobi Social Invited Talk)
Location and Language in Social Media (Stanford Mobi Social Invited Talk)
 
Crowdsourcing using MTurk for HCI research
Crowdsourcing using MTurk for HCI researchCrowdsourcing using MTurk for HCI research
Crowdsourcing using MTurk for HCI research
 
CIKM 2011 Social Computing Industry Invited Talk
CIKM 2011 Social Computing Industry Invited TalkCIKM 2011 Social Computing Industry Invited Talk
CIKM 2011 Social Computing Industry Invited Talk
 
WikiSym 2011 Closing Keynote
WikiSym 2011 Closing KeynoteWikiSym 2011 Closing Keynote
WikiSym 2011 Closing Keynote
 
CSCL 2011 Keynote on Social Computing and eLearning
CSCL 2011 Keynote on Social Computing and eLearningCSCL 2011 Keynote on Social Computing and eLearning
CSCL 2011 Keynote on Social Computing and eLearning
 
Replication is more than Duplication: Position slides for CHI2011 panel on re...
Replication is more than Duplication: Position slides for CHI2011 panel on re...Replication is more than Duplication: Position slides for CHI2011 panel on re...
Replication is more than Duplication: Position slides for CHI2011 panel on re...
 
Tutorial on Using Amazon Mechanical Turk (MTurk) for HCI Research
Tutorial on Using Amazon Mechanical Turk (MTurk) for HCI ResearchTutorial on Using Amazon Mechanical Turk (MTurk) for HCI Research
Tutorial on Using Amazon Mechanical Turk (MTurk) for HCI Research
 
Crowdsourcing for HCI Research with Amazon Mechanical Turk
Crowdsourcing for HCI Research with Amazon Mechanical TurkCrowdsourcing for HCI Research with Amazon Mechanical Turk
Crowdsourcing for HCI Research with Amazon Mechanical Turk
 
Eddi: Topic Browsing of Twitter Streams
Eddi: Topic Browsing of Twitter StreamsEddi: Topic Browsing of Twitter Streams
Eddi: Topic Browsing of Twitter Streams
 
Large Scale Social Analytics on Wikipedia, Delicious, and Twitter (presented ...
Large Scale Social Analytics on Wikipedia, Delicious, and Twitter (presented ...Large Scale Social Analytics on Wikipedia, Delicious, and Twitter (presented ...
Large Scale Social Analytics on Wikipedia, Delicious, and Twitter (presented ...
 
Model-based Research in Human-Computer Interaction (HCI): Keynote at Mensch u...
Model-based Research in Human-Computer Interaction (HCI): Keynote at Mensch u...Model-based Research in Human-Computer Interaction (HCI): Keynote at Mensch u...
Model-based Research in Human-Computer Interaction (HCI): Keynote at Mensch u...
 
Zerozero88 Twitter URL Item Recommender
Zerozero88 Twitter URL Item RecommenderZerozero88 Twitter URL Item Recommender
Zerozero88 Twitter URL Item Recommender
 
Smart eBooks: ScentIndex and ScentHighlight research published at VAST2006
Smart eBooks: ScentIndex and ScentHighlight research published at VAST2006Smart eBooks: ScentIndex and ScentHighlight research published at VAST2006
Smart eBooks: ScentIndex and ScentHighlight research published at VAST2006
 
Model-Driven Research in Social Computing
Model-Driven Research in Social ComputingModel-Driven Research in Social Computing
Model-Driven Research in Social Computing
 
ASC Disaster Response Proposal from Aug 2007
ASC Disaster Response Proposal from Aug 2007ASC Disaster Response Proposal from Aug 2007
ASC Disaster Response Proposal from Aug 2007
 
China HCI Symposium 2010 March: Augmented Social Cognition Research from PARC...
China HCI Symposium 2010 March: Augmented Social Cognition Research from PARC...China HCI Symposium 2010 March: Augmented Social Cognition Research from PARC...
China HCI Symposium 2010 March: Augmented Social Cognition Research from PARC...
 
2010-03-10 PARC Augmented Social Cognition Research Overview
2010-03-10 PARC Augmented Social Cognition Research Overview2010-03-10 PARC Augmented Social Cognition Research Overview
2010-03-10 PARC Augmented Social Cognition Research Overview
 
2010-02-22 Wikipedia MTurk Research talk given in Taiwan's Academica Sinica
2010-02-22 Wikipedia MTurk Research talk given in Taiwan's Academica Sinica2010-02-22 Wikipedia MTurk Research talk given in Taiwan's Academica Sinica
2010-02-22 Wikipedia MTurk Research talk given in Taiwan's Academica Sinica
 

Último

Último (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Using Information Scent to Model Users in Web1.0 and Web2.0

  • 1. Modeling of Web Users from Web1.0 to Web2.0 Ed H. Chi, Principal Scientist and Area Manager Augmented Social Cognition Area Palo Alto Research Center Image from: http://www.flickr.com/photos/ourcommon/480538715/ 2010-03-20 Utrecht CogModeling
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Analogy to Optimal Foraging 2010-03-20 Utrecht CogModeling Information Energy
  • 7.
  • 8.
  • 9. 2010-03-20 Utrecht CogModeling i bread j butter sandwich flour Ai = Bi +  WjSji Activation of chunk i Base-level activation of chunk i Activation spread from linked chunks j Activation depends on a base level plus activation spread from associated chunks Bi = log( ) Pr( i ) Pr(not i ) Sji = log( ) Pr( j | i ) Pr( j |not i ) log likelihood of i occurring log likelihood of i occurring with j Base level activation reflects log likelihood of events in the world. Strength of spread reflects log likelihood of event cooccurrance
  • 10.
  • 11. WUFIS: Web User Flow by Information Scent 2010-03-20 Utrecht CogModeling User Information Goal Web site Web Page content links Web user flow simulation Predicted paths
  • 12. InfoScent: How does it work? Utrecht CogModeling Start users at page with some goal Flow users through the network Examine user patterns Scent Values: Probabilities of Transition 2010-03-20
  • 13. InfoScent Simulation Utrecht CogModeling 2 1 2010-03-20 Now with the Scent Matrix, we then perform Spreading Activation. 3 Weight Matrix Query Relevant Docs R = Relevant documents T = Topology matrix Normalize to Probability Scent Matrix
  • 14.
  • 15.
  • 16. Bloodhound Project 2010-03-20 Utrecht CogModeling Starting Point: www.xerox.com Task: look for “ high end copiers ” OUTPUT usability metrics INPUT
  • 17. Input Tasks 2010-03-20 Utrecht CogModeling
  • 18. Stanford CS 2010-03-20 Utrecht CogModeling
  • 19. ONR 2010-03-20 Utrecht CogModeling
  • 21. User Traces 2010-03-20 Utrecht CogModeling
  • 22.
  • 23.
  • 24. IUNIS: Inferring User Need by Info Scent 2010-03-20 Utrecht CogModeling User Information Goal Web site Web Page content links Web user flow simulation Observed paths
  • 26.
  • 27.
  • 28.
  • 29. Web page with highlighted link anchors 2010-03-20 Partial information goal: “ remote diagnostic technology” Remainder of information goal: “ speed >= 75” Utrecht CogModeling 62 copies/min. 92 copies/min.
  • 30.
  • 31. Results of user study Utrecht CogModeling (times capped at five minutes) 10/12 subjects preferred ScentTrails to both searching and browsing 2010-03-20
  • 32. ScentIndex 2010-03-20 Utrecht CogModeling Exact Matches in red Associated Entries underlined in red
  • 33. ScentHighlight User first type search keywords: “anthrax symptoms” Conceptually highlight any relevant passages and keywords Draw user attention 2010-03-20 Utrecht CogModeling
  • 35.
  • 36. Heuristics 2010-03-20 Utrecht CogModeling Poor heuristic Good heuristic
  • 37. “ Hints” 2010-03-20 Utrecht CogModeling Solo Cooperative (“good hints”)
  • 38.
  • 39.
  • 40.
  • 41. 2010-03-20 Utrecht CogModeling Characterization Models Prototypes Evaluations
  • 42.
  • 43. Using Information Theory to Model Social Tagging [Ed H. Chi, Todd Mytkowicz, ACM Hypertext 2008] Topics Users Documents Decoding 2010-03-20 Utrecht CogModeling Concepts Tags T 1 …T n Encoding Noise
  • 44. H(Tag) shows saturation in tag usage 2010-03-20 Utrecht CogModeling
  • 45. H(Doc | Tag), browsability 2010-03-20 Utrecht CogModeling
  • 46. I ( Doc ; Tag ) Mutual Information 2010-03-20 Utrecht CogModeling Source: Hypertext 2008 study on del.icio.us (Chi & Mytkowicz)
  • 47. Raise in avg. tag per bookmark (note parallel the development in increasing # of query words) 2010-03-20 Utrecht CogModeling
  • 48. 2010-03-20 Utrecht CogModeling Characterization Models Prototypes Evaluations
  • 49.
  • 50. TagSearch: Use Semantic Analysis to Reduce Noise http://mrtaggy.com 2010-03-20 Utrecht CogModeling Guide Web Howto Tips Help Tools Tip Tricks Tutorial Tutorials Reference Semantic Similarity Graph
  • 51.
  • 52. Understanding a new area… 2010-03-20 Characterization Models Prototypes Evaluations Utrecht CogModeling
  • 53. MrTaggy.com: social search browser with social bookmarks Joint work with Rowan Nairn, Lawrence Lee Kammerer, Y., Nairn, R., Pirolli, P., and Chi, E. H. 2009. Signpost from the masses: learning effects in an exploratory social tag search browser. In Proceedings of the 27th international Conference on Human Factors in Computing Systems (Boston, MA, USA, April 04 - 09, 2009). CHI '09. ACM, New York, NY, 625-634. 2010-03-20 Utrecht CogModeling
  • 55.
  • 56. Understanding a new area… 2010-03-20 Characterization Models Prototypes Evaluations Utrecht CogModeling
  • 57. Baseline Interface 2010-03-20 Utrecht CogModeling
  • 58.
  • 59.
  • 60.
  • 61. The Team 2010-03-20 Utrecht CogModeling
  • 62.
  • 64. Enhanced Thumbnails Andrew Faulring, Allison Woodruff and Ruth Rosenholtz 2010-03-20 Utrecht CogModeling   enhanced plain
  • 65. Popout Prism [ Suh &Woodruff] 2010-03-20 Utrecht CogModeling
  • 66.
  • 67. TagSearch Exploratory Focus 3 kinds of search 2010-03-20 Utrecht CogModeling navigational transactional 28% 13% You know what you want and where it is You know what you want to do Existing search engines are OK informational 59% You roughly know what you want but don’t know how to find it Difficult for existing search engines Opportunity

Notas do Editor

  1. Title: Modeling of Web Users from Web1.0 to Web2.0 Abstract: In this talk, I will provide a perspective on how information scent techniques have taken us to characterize and model individual web surfers in the Web1.0 world, and how we used those techniques to build applications and systems. Then I will present some ideas of we might bridge these ideas to the Web2.0 world by modeling groups of users using Web2.0 systems.
  2. . Example: Media news is fresh. With the right interest, users have a high probability of following that piece of information. . Hunters strategies maximizes the benefit per cost of pursuing the prey. Information gatherers do exactly the same thing.
  3. . Example: Media news is fresh. With the right interest, users have a high probability of following that piece of information. . Hunters strategies maximizes the benefit per cost of pursuing the prey. Information gatherers do exactly the same thing.
  4. Statistically, a correlation coefficient above 0.8 is generally considered to be strong correlation, and between 0.5 and 0.8 is considered moderate, while below 0.5 is considered weak correlation . Twelve correlated strongly, and seventeen of the 32 tasks correlated moderately.
  5. . Using our technology, by telling the web site of your special requirements, each virtual aisle of the web site is pre-highlighted according to your special request, making it easier for you to shop.
  6. In the enterprise, these have become the standard set of Web 2.0 tools in practice. They have several benefits – they can be set up by end users without needing IT, they have familiar UIs from consumer versions, And in terms of knowledge sharing, an important advantage these tools have over traditional KM systems is that knowledge can be captured and archived through the act of communication without requiring extra work by users. These tools will become increasingly important in the office as younger people enter the workforce and expect to be able to use them.
  7. There are really two facets of tagging. The first is encoding: when you encounter a document, have read or skimmed it and have to generate a few words that describe it. The second side of tagging is retrieval: you find a new document that has several tags attached to it, and you read those tags and the document. The tags may give you an idea about what the document is about. I am going to come back to this distinction later.
  8. Vocabulary saturation! shows a marked increase in the entropy of the tag distribution H(T) up until week 75 (mid-2005) at which point the entropy measure hits a plateau. Since the total number of tags keeps increasing, tag entropy can only stay constant in the plateau by having the tag probability distribution become less uniform. What this suggests is that users are having a hard time coming up with “unique” tags. That is to say, a user is more likely to add a tag to del.icio.us that is already popular in the system, than to add a tag that is relatively obscure.
  9. What’s perhaps the most telling data of all is the entropy of documents conditional on tags, H(D|T) , which is increasing rapidly (see Figure 4). What this means is that, even after knowing completely the value of tags, the entropy of the document is still increasing. Conditional Entropy asks the question: “Given that I know a set of tags, how much uncertainty regarding the document set that I was referencing with those tags remains?” This measure gives us a method for analyzing how useful a set of tags is at describing a document set. The fact that this curve is strictly increasing suggests that the specificity of any given tag is decreasing. That is to say, as a navigation aid, tags are becoming harder and harder to use. We are moving closer and closer to the proverbial “needle in a haystack” where any single tag references too many documents to be considered useful.
  10. Figure 6 shows the number of tags per bookmark over time. The trend is clearly increasing, complementing the increase in navigation difficulty.
  11. We introduce a technique for creating novel, textually-enhanced thumbnails of web pages. These thumbnails combine the advantages of image thumbnails and text summaries to provide consistent performance on a variety of tasks. We conducted a study in which participants used three different types of summaries (enhanced thumbnails, plain thumbnails, and text summaries) to search web pages to find several different types of information. Participants took an average of 83 seconds to find the answer to a question. They were approximately 30 seconds faster with enhanced thumbnails than with text summaries, and 19 seconds faster with enhanced thumbnails than with plain thumbnails. Further, performance with enhanced thumbnails was much more consistent than with text summaries or plain thumbnails. In the images shown on this slide, the top row contains plain (scale-reduced) thumbnails of web pages. The bottom row contains thumbnails that have been enhanced in the following way: (1) the fonts in H1 and H2 tags have been modified so that they are readable in the thumbnails; (2) transparent, highlighted callouts have been included for keywords from the search query (appropriate highlighted colors were chosen based on visual attention models); and (3) the contrast level in the thumbnail has been reduced so that the callouts are more prominent and readable.
  12. Informational search – ambiguity in query – where social search has most power