{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T19:15:38Z","timestamp":1723490138640},"reference-count":47,"publisher":"Wiley","issue":"9","license":[{"start":{"date-parts":[[2003,5,7]],"date-time":"2003-05-07T00:00:00Z","timestamp":1052265600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Am. Soc. Inf. Sci."],"published-print":{"date-parts":[[2003,7]]},"abstract":"Abstract<\/jats:title>User studies demonstrate that nondomain experts do not use the same information\u2010seeking strategies as domain experts. Because of the transformation of integrated library systems into Information Gateways in the late 1990s, both nondomain experts and domain experts have had available to them the wide range of information\u2010seeking strategies in a single system. This article describes the results of a study to answer three research questions: (1) do nondomain experts enlist the strategies of domain experts? (2) if they do, how did they learn about these strategies? and (3) are they successful using them? Interviews, audio recordings, screen captures, and observations were used to gather data from 14 undergraduate students who searched an academic library's Information Gateway. The few times that the undergraduates in this study enlisted search strategies that were characteristic of domain experts, it usually took perseverance, trial\u2010and\u2010error, serendipity, or a combination of all three for them to find useful information. Although this study's results provide no compelling reasons for systems to support features that make domain\u2010expert strategies possible, there is need for system features that scaffold nondomain experts from their usual strategies to the strategies characteristic of domain experts.<\/jats:p>","DOI":"10.1002\/asi.10281","type":"journal-article","created":{"date-parts":[[2003,6,4]],"date-time":"2003-06-04T10:07:21Z","timestamp":1054721241000},"page":"836-854","source":"Crossref","is-referenced-by-count":41,"title":["Do nondomain experts enlist the strategies of domain experts?"],"prefix":"10.1002","volume":"54","author":[{"given":"Karen M.","family":"Drabenstott","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2003,5,7]]},"reference":[{"key":"e_1_2_7_2_1","first-page":"38","article-title":"Mounting local tapes: The NOTIS interface combines turnkey ease and adaptability","volume":"14","author":"Bakowski V.B.","year":"1990","journal-title":"Online"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.4630300406"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb024320"},{"key":"e_1_2_7_5_1","volume-title":"Experimental information service in the social sciences 1969\u20131971: Final report","author":"Bath University","year":"1972"},{"key":"e_1_2_7_6_1","volume-title":"Information storage and retrieval","author":"Becker J.","year":"1963"},{"key":"e_1_2_7_7_1","first-page":"133","article-title":"Anomalous states of knowledge as a basis for information retrieval","volume":"5","author":"Belkin N.J.","year":"1980","journal-title":"Canadian Journal of Information Science"},{"key":"e_1_2_7_8_1","doi-asserted-by":"crossref","unstructured":"Bhavnani S.K.(2002).Domain\u2010specific search strategies for the effective retrieval of healthcare and shopping information. Proceedings of CHI2002(pp.610\u2013611).","DOI":"10.1145\/506443.506508"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0099-1333(01)00302-0"},{"key":"e_1_2_7_10_1","volume-title":"Research report prepared for OCLC on end user behavior on The Ohio State University Libraries' online catalog: A computer monitoring study","author":"Borgman C.L.","year":"1983"},{"key":"e_1_2_7_11_1","series-title":"Integrative mechanisms in literature growth: Final report","first-page":"111","author":"Coblenz K.","year":"1970"},{"key":"e_1_2_7_12_1","first-page":"188","article-title":"Undergraduate library skills: Two surveys at Johns Hopkins University","volume":"11","author":"Coupe J.","year":"1993","journal-title":"Research Strategies"},{"key":"e_1_2_7_13_1","volume-title":"Understanding subject headings for online retrieval","author":"Drabenstott K.M.","year":"1994"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb026843"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1086\/602622"},{"key":"e_1_2_7_16_1","first-page":"163","article-title":"The research process of undergraduate students","volume":"18","author":"Fister B.","year":"1992","journal-title":"Journal of Academic Librarianship"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.5860\/crl_52_06_549"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb026813"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1515\/mfir.1982.11.4.237"},{"key":"e_1_2_7_20_1","volume-title":"The extreme searchers guide to Web search engines: A handbook for the serious searcher","author":"Hock R.","year":"2001"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0143-6236(84)90046-2"},{"key":"e_1_2_7_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(99)00056-4"},{"key":"e_1_2_7_23_1","first-page":"232","article-title":"Developing a model of the library search process: Cognitive and affective aspects","volume":"28","author":"Kuhlthau C.C.","year":"1988","journal-title":"RQ"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199106)42:5<361::AID-ASI6>3.0.CO;2-#"},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0099-1333(96)90003-8"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb050298"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0099-1333(96)90059-2"},{"key":"e_1_2_7_28_1","volume-title":"The process of subject searching in the library catalog: Final report of the subject access research project","author":"Markey K.","year":"1983"},{"key":"e_1_2_7_29_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb047598"},{"key":"e_1_2_7_30_1","first-page":"1","article-title":"Today's students, tomorrow's FGUs","volume":"3","author":"Outsell Inc","year":"2000","journal-title":"Information About Information Briefing"},{"key":"e_1_2_7_31_1","doi-asserted-by":"crossref","unstructured":"Payette S.D. &Rieger O.Y.1997. Z39.50: The user's perspective. D\u2010Lib Magazine 3 4 (http:\/\/www.dlib.org\/dlib\/april97\/cornell\/04payette.html.","DOI":"10.1045\/april97-payette"},{"key":"e_1_2_7_32_1","first-page":"267","article-title":"When smart people fail: An analysis of the transaction log of an online public access catalog","volume":"15","author":"Peters T.A.","year":"1989","journal-title":"Journal of Academic Librarianship"},{"key":"e_1_2_7_33_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb047882"},{"key":"e_1_2_7_34_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(2000)51:8<757::AID-ASI80>3.0.CO;2-T"},{"key":"e_1_2_7_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4571(2000)9999:9999<::AID-ASI1591>3.0.CO;2-R"},{"key":"e_1_2_7_36_1","doi-asserted-by":"publisher","DOI":"10.5860\/crl_40_05_426"},{"key":"e_1_2_7_37_1","doi-asserted-by":"publisher","DOI":"10.5860\/crl_42_06_549"},{"key":"e_1_2_7_38_1","doi-asserted-by":"publisher","DOI":"10.5860\/crl_45_02_99"},{"key":"e_1_2_7_39_1","series-title":"Integrative mechanisms in literature growth: Final report","first-page":"97","author":"Tagliacozzo R.","year":"1970"},{"key":"e_1_2_7_40_1","first-page":"20","article-title":"Subject access on Internet: Highlights of the metasearch engines","volume":"36","author":"Tan W.","year":"1998","journal-title":"Journal of Educational Media & Library Sciences"},{"key":"e_1_2_7_41_1","doi-asserted-by":"publisher","DOI":"10.5860\/crl_29_03_178"},{"key":"e_1_2_7_42_1","first-page":"318","article-title":"Library user education: Examining its past, projecting its future","volume":"44","author":"Tiefel V.","year":"1995","journal-title":"Library Trends"},{"key":"e_1_2_7_43_1","volume-title":"Current utilization of online catalogs: Transaction log analysis","author":"Tolle J.E.","year":"1983"},{"key":"e_1_2_7_44_1","first-page":"30","article-title":"Are metasearches better searches?","volume":"7","author":"Tomaiuolo N.","year":"1999","journal-title":"Searcher"},{"key":"e_1_2_7_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/0099-1333(93)90026-2"},{"key":"e_1_2_7_46_1","volume-title":"Information retrieval","author":"Van Rijsbergen C.J.","year":"1979"},{"key":"e_1_2_7_47_1","doi-asserted-by":"publisher","DOI":"10.1177\/096100067700900403"},{"key":"e_1_2_7_48_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb026467"}],"container-title":["Journal of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fasi.10281","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/asi.10281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T13:57:42Z","timestamp":1697205462000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/asi.10281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,5,7]]},"references-count":47,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2003,7]]}},"alternative-id":["10.1002\/asi.10281"],"URL":"https:\/\/doi.org\/10.1002\/asi.10281","archive":["Portico"],"relation":{},"ISSN":["1532-2882","1532-2890"],"issn-type":[{"value":"1532-2882","type":"print"},{"value":"1532-2890","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003,5,7]]}}}