{"title":"在线报纸扫描路径分析——用户与专家路径比较","authors":"Lea Schubart","doi":"10.5281/zenodo.17981","DOIUrl":null,"url":null,"abstract":"This study examines to what extent, within online newspapers, the user’s scan path coincides with the real information behavior found within the newspapers according to the experts. Primary research methods utilized are questionnaires, interviews and eye tracking (concerning scenarios) of user/ expert scan paths of the online newspapers. Information obtained through these methods will be compared and contrasted where appropriate to examine the primary purpose of this study.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"339 1","pages":"501-505"},"PeriodicalIF":0.0000,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analysis of the Scan Path Using Online Newspapers - Path Comparison Between User and Expert\",\"authors\":\"Lea Schubart\",\"doi\":\"10.5281/zenodo.17981\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This study examines to what extent, within online newspapers, the user’s scan path coincides with the real information behavior found within the newspapers according to the experts. Primary research methods utilized are questionnaires, interviews and eye tracking (concerning scenarios) of user/ expert scan paths of the online newspapers. Information obtained through these methods will be compared and contrasted where appropriate to examine the primary purpose of this study.\",\"PeriodicalId\":90875,\"journal\":{\"name\":\"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics\",\"volume\":\"339 1\",\"pages\":\"501-505\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-05-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5281/zenodo.17981\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5281/zenodo.17981","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of the Scan Path Using Online Newspapers - Path Comparison Between User and Expert
This study examines to what extent, within online newspapers, the user’s scan path coincides with the real information behavior found within the newspapers according to the experts. Primary research methods utilized are questionnaires, interviews and eye tracking (concerning scenarios) of user/ expert scan paths of the online newspapers. Information obtained through these methods will be compared and contrasted where appropriate to examine the primary purpose of this study.