<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Modeling Knowledge Change Behaviors in Learning-related Tasks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Chang Liu</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Xiaoxuan Song</string-name>
          <email>songxiaoxuan@pku.edu.cn</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hanrui Liu</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nicholas J. Belkin</string-name>
          <email>belkin@rutgers.edu</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Peking University</institution>
          ,
          <addr-line>No.5 Yiheyuan Road Haidian District, Beijing</addr-line>
          ,
          <country country="CN">P.R.China</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Rutgers University</institution>
          ,
          <addr-line>57 US Highway 1, New Brunswick, NJ</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In Search as Learning (SAL) research, when and how learning occurs during the search process has been a focus that attracts research attention. The goal of this study is to explore and characterize searchers' knowledge change patterns in the context of learning-related tasks from a process perspective. A user experiment was conducted, and participants were asked to search for two learning-related search tasks in a laboratory environment, and draw mind maps before and during search to keep a record of what they know about the task. Searchers' knowledge change behaviors during the search process were extracted from their mind maps and analyzed based on the "Actions-Tactics-Strategies (ATS)" research path. In this study, we report current preliminary analysis, which discovered twenty-five types of knowledge change actions, and identified eight types of knowledge change tactics using bottom-up clustering methods. The findings are the basis for our further exploration of searchers' learning strategies during the whole session, also present a complete behavioral and cognitive picture of searchers' knowledge change process, for search systems providing assistance at different stages of searching and learning.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Knowledge change behaviors</kwd>
        <kwd>Learning-related tasks</kwd>
        <kwd>Knowledge structure</kwd>
        <kwd>Actions-Tactics-Strategies (ATS)</kwd>
        <kwd>Search as Learning (SAL)</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        “Search as Learning (SAL)” considers search
systems as learning technologies rather than
merely information retrieval tools, and allows for
an understanding of users’ information search
behavior in the broader context of human learning.
Interpreting users’ information search behaviors
from the learning perspective is not a new topic.
Belkin’s [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] ASK model argues that users’
knowledge state is anomalous and inadequate to
achieve some goal and ASK is the motivation why
people turn to search. However, ASK did not fully
describe how users’ knowledge would change
during search. Marchionini [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] described
information seeking as “a process, in which
humans purposefully engage in order to change
their state of knowledge”. Kuhlthau’s ISP model
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] examined users’ emotional and cognitive
changes during the search process. Recently,
more empirical studies focused on searchers’
knowledge change during the search process, and
evaluated their knowledge gain as a search or
learning outcome [
        <xref ref-type="bibr" rid="ref15 ref18 ref3 ref5">3, 5, 15, 18</xref>
        ].
      </p>
      <p>
        In addition to learning outcomes, in SAL,
researchers strive for demonstrating when and
how learning occurs during the search process.
Some previous studies regarded users’ writing
behaviors and strategies as learning indicators [
        <xref ref-type="bibr" rid="ref12 ref13">12,
13</xref>
        ]. However, it is difficult to infer learners’
knowledge structure and their knowledge gain
solely through such textual evidence.
      </p>
      <p>
        Research in sense-making has examined
changes of knowledge structures using interview
or think-aloud protocols, e.g. Zhang &amp; Soergel
[
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. They used three broad classes of conceptual
changes: accretion, tuning and restructuring. Then
they further identified nine types of change
patterns. However, the think-aloud method may
interfere with users’ searching behavior or
learning process. It may be difficult for some
users to simultaneously articulate their thoughts
and complete complex tasks [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        In the current study, we applied the
mindmapping technique to elicit users’ knowledge
changes during their search process, in order to
clarify how learning occurs during the search
process. In our previous study [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], the mind-map
technique has been shown to be an effective tool
to represent knowledge changes during the search
process. In this study, we developed a
comprehensive coding system that considers
users’ actions on both nodes and links in their
mind maps. The sequence clustering method from
Hendahewa et al.’s two studies [
        <xref ref-type="bibr" rid="ref4 ref6">4, 6</xref>
        ] was
expanded and applied to identify knowledge
change patterns during the search process based
on users’ actions on their mind maps.
      </p>
      <p>
        Inspired by Bates’s [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] study on search moves,
tactics, and strategies, we propose a three-level
analysis path, "Actions-Tactics-Strategies (ATS)"
to identify searchers’ knowledge change tactics
and strategies (as shown in Figure 1). First, we
coded manually to characterize and identify
different types of users’ knowledge change
actions from mind maps; then we used the
sequence clustering method to obtain knowledge
change tactics; and finally, knowledge change
strategies were abstracted from the
transformational relationship of knowledge
change tactics in each session. The bottom-up
analysis could help us describe searchers’
knowledge change process comprehensively.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Data Collection Method</title>
      <p>A user experiment was conducted to address
our research questions. We recruited thirty-five
students from Peking University. Among all the
participants, there were fifteen males and twenty
females, with ages between seventeen and
twenty-nine. There were sixteen undergraduates
and nineteen postgraduates whose majors
included Information Science, Computer Science,
Chemistry, Psychology, Sociology, Medical
Science and Environmental Science. We first sent
out a recruitment questionnaire, and then only
selected those participants who were familiar with
the basic operations of mind-map and had drawn
a mind-map at least once in their daily work or
study, to ensure that they all had sufficient
knowledge in drawing mind-maps.</p>
      <p>During the experiment, participants used a
desktop computer in our research lab to search for
two learning-related search tasks. They first filled
out a background questionnaire. Before the search
started, participants read the task description, and
then were asked to draw a mind-map using
XMind8 (https://www.xmind.cn/xmind8-pro/, a
tool for supporting construction of mind-maps
online) to represent knowledge they knew about
the topic. The next step was to complete a
presearch questionnaire to elicit data like topic
familiarity. Participants were instructed to modify
the mind-map during their search whenever they
thought they learned something while searching,
and were told to stop searching when they
believed that their mind-map represented the
knowledge needed to answer the task. After the
search, participants were asked to write an essay
in a notepad file to answer the task, only referring
to their mind-map records. When the essay was
submitted, a post-search questionnaire was given
to participants to evaluate task difficulty. After
that, participants began work on the second
search task with the same procedure. Finally, the
participants completed a post-experiment
questionnaire about their general search
experience. The order of the two search tasks
were balanced among all the participants, that is
half of participants completed task 1 first, the
other half completed task 2 first. During search,
participants’ interactions with the computer were
recorded by Morae Recorder 3.3.
2.1.</p>
    </sec>
    <sec id="sec-3">
      <title>Learning-related search tasks</title>
      <p>
        We adopted the cognitive learning mode
model introduced by Rieh et al. [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] to construct
the learning-related tasks in our experiment. Two
types of tasks were designed: Receptive learning
and Critical learning tasks. The receptive learning
task is defined as understanding, remembering
and reproducing what is taught, and the critical
learning task is defined as criticizing and
evaluating ideas from multiple perspectives. The
descriptions of the two tasks are as follows.
      </p>
      <p>Task 1 (Receptive learning, Topic: iPhoneX
face recognition): Your brother has just entered
college and wants to change to a new mobile
phone. He heard that Apple has launched a very
powerful face recognition technology in iPhoneX,
which makes the use of mobile phones more
convenient and interesting. He hopes that you can
introduce him to functions and usage scenarios
using face recognition technology in iPhoneX; at
the same time, to describe the advantages and
innovations of face recognition in iPhoneX
compared with previous face recognition
technology. You need to search for relevant
information to explain the above questions to your
brother.</p>
      <p>Task 2 (Critical learning, Topic: Bitcoin):
Recently, Bitcoin has set off another wave of
enthusiasm. Many students are interested in it but
don’t know much about it. In the "Internet
Finance" course, you chose the topic of "Bitcoin"
to give a presentation of about 3 minutes. You
intend to introduce the differences between
Bitcoin and common currency (such as RMB,
USD). At the same time, analyze whether Bitcoin
can become a currency that is generally circulated
in reality, and finally give your conclusion
(Yes/No). In order to complete this presentation,
you need to search for relevant information and
prepare your lecture material.
2.2.</p>
    </sec>
    <sec id="sec-4">
      <title>Mind-map drawing</title>
      <p>
        Previous studies have demonstrated that
knowledge in human brains is organized
semantically in networks, built piece by piece
with small units of interacting concepts and
frameworks [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Visualizations could help
externalize and elicit the abstract structure of
knowledge, to support learners’ cognitive
processing and retain knowledge in long-term
memory [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. The mind-map technique provides
a means to visually represent knowledge
structures, which could possibly support learning,
as well.
      </p>
      <p>In the current study, participants were asked to
first draw a pre-search mind-map after they read
the task description, before they filled in the
presearch questionnaire and before they conducted
the search. For this mind-map, they were asked to
draw a mind-map which represented what they
already knew about this search task. They were
instructed that they could draw a mind map
structure directly if they had a structure in mind;
otherwise, they could just list as many points as
possible, and then choose which of them to
include in the mind map structure later.</p>
      <p>While they were searching for information for
the tasks, they could modify and improve their
mind-maps using the information they collected.
They were encouraged to modify or update the
mind-map to organize their thoughts after
obtaining new information. They were also told
that, after done with searching, they would write
down their answers to the task, referring only to
their mind-maps they drew during their search,
without checking any webpages at that point.</p>
    </sec>
    <sec id="sec-5">
      <title>3. Data Analysis Method</title>
      <p>The data analysis in this study involves two
main steps. The first step is to characterize users’
knowledge change actions in Mind maps, which
was achieved using manual two-layer coding. The
second step is to identify the knowledge change
tactics through clustering of sub-sequences of
knowledge change actions. This section describes
these two main steps in detail.</p>
    </sec>
    <sec id="sec-6">
      <title>3.1. Encoding of users’ knowledge change actions</title>
      <p>Through watching video recordings, we
encoded the knowledge change process in two
layers. The first layer aims to reflect the process
of knowledge change actions in detail; the second
layer is to match the knowledge change actions
with types of conceptual changes in cognition for
the next step analysis.</p>
      <p>• First layer coding</p>
      <p>An example participant’s pre-search
mindmap is shown in Figure 2, and the mind-map after
search is shown in Figure 3. The purpose of these
figures is to indicate the general nature of a
mindmap, and to show how the structure of such a
representation could change. The actual meanings
of the nodes are not at issue here. We then coded
the level of each node in the mind-map in the
postsearch map. There was at least one knowledge
tree in the mind-map, and each tree had a central
node, which was the primary node and coded as
level 1, and its children nodes were coded as level
2. We coded each node's level according to the
above rules. An example of the coding is shown
in Figure 4.</p>
      <p>In general, users could change two types of
objects in mind maps: nodes or links. As there
exist differences in knowledge change, we
designed separate coding schemes for nodes and
links, as shown in Table 1 and Table 2, to code
knowledge changes in the mind maps.
• Second layer coding</p>
      <p>
        On the basis of the first layer coding, we can
integrate part of the first layer of coding with
Rumelhart and Norman’s [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] three kinds of
concept change: accretion, tuning and restructuring.
Accretion refers to the addition of new information
into existing knowledge, but does not cause
changes in the knowledge structure. Tuning focuses
on the organization and interpretation of
information, which will cause weak changes in the
knowledge structure. Restructuring is a major
change to the existing knowledge structure or the
creation of a new structure. We found that, during
search, sometimes searchers checked the mind map
without making any changes. Such actions might
serve to get an overview of their knowledge
structure or to confirm certain details. Thus, we add
“Observation” as a new type of interaction with
knowledge structures, as shown in Table 3.
      </p>
    </sec>
    <sec id="sec-7">
      <title>3.2. Identification of tactics</title>
      <p>
        This section describes the three steps involved
in the identification of knowledge change tactics.
① Constructing knowledge change action
sequences. The complete description of knowledge
change actions includes two parts: action types and
duration. We used Hendahewa and Shah's [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]
method in constructing action sequences to
generate repeated action sequences according to the
duration of each knowledge change action. In order
to reduce the impact of the total task completion
time on the duration of a single behavior, we
normalized action durations in the session using the
following function: (Action length i - Action length
minimum) divided by (Action length maximum
Action length minimum). The sequence of repeated
actions is generated according to the standardized
duration, and then the sequence of repeated actions
is concatenated according to the occurrence order
of knowledge change action to form the sequence
of knowledge change action for each session.
② Cutting knowledge changes action sequences
into sub-sequences. Because the length of
knowledge change action sequences varies from 33
to 456 in different sessions, it was difficult to
directly compare sequences of knowledge change
actions. Therefore, each long sequence was divided
into sub-sequences of equal length. We wanted the
extracted sub-sequences to be realistic. So we
checked the number of knowledge change actions
each time users opened the XMind software, and
found that among all the sessions, the length of
knowledge change action sequence was shorter
than 18 in 95% cases. We therefore set window
length to 18 with a sliding distance of 9. In other
words, multiple sub-sequences of knowledge
change actions were extracted from each session.
The length of each sub-sequence was 18 (the length
of the last sub-sequence of the session may be less
than 18), and the repetition rate between adjacent
sub-sequences was 50%. The results of sequence
cutting resulted in 1100 sub-sequences.
③ The tactics are obtained through cluster
analysis. Then we carried out a hierarchical
clustering analysis on all sub-sequences to obtain
the users’ knowledge change tactics.
      </p>
    </sec>
    <sec id="sec-8">
      <title>4. Results</title>
    </sec>
    <sec id="sec-9">
      <title>4.1. Knowledge change actions</title>
      <p>Twenty-five types of searchers’ knowledge
change actions were identified in this study,
considering the actions and positions of knowledge
change. As shown in Figure 5, Accretion actions
were the most frequent actions, which accounted
for 51%, followed by Tuning (26%) and
Observation (13%), and Restructuring actions
happened least frequently (10%).</p>
      <p>With respect to knowledge change positions
(Figure 6), searchers preferred moving between
sibling nodes in the form of horizontal expansion,
with the highest proportion (31%). Actions on
father nodes and summary nodes only accounted
for 2% and 1%, which suggests that searchers rarely
restructured or summarized knowledge they
collected during the knowledge change process.
We further measured the duration of each type
of knowledge change action and examined the
relationship between duration and the type of
knowledge change action. The results in Figure 7
show that it took searchers the longest time to
Restructure their knowledge structure, followed by
Tuning and Accretion. Even though the duration of
Observation was the shortest, the average duration
was still 8.89 seconds. This indicates that learning
was a complex cognitive process and the more
complex the cognitive process, the longer it took
searchers to generate the output. This also
demonstrates that the coding of the knowledge
change actions in this study was reasonable.</p>
      <p>The examination of duration for each position
(Figure 8) reveals that users often spent the longest
time on summary nodes, followed by discorded
node and self-node. There was not much difference
among child nodes, sibling nodes, father nodes or
ordered nodes.
of knowledge</p>
      <p>We calculated the Hamming distance among the
1100 sub-sequences, used the cluster package in R
to carry out hierarchical clustering analysis, and
adopted the Ward method to calculate the distance
among the clusters. According to the results of the
dendrogram, eight types of distinguishing clusters
were identified, based on the maximization of
difference, approximate equivalence of level, and
scale of clusters, as shown in Figure 9.</p>
      <p>In terms of the characteristics of each cluster, we
named the eight knowledge change tactics as
follows: Tactics of Accretion of Child nodes (TAC),
Tactics of Accretion of S nodes (TAS), Tactics of
Accretion of Disordered nodes (TAD), Tactics of
Tuning of Same nodes (TTS), Tactics of Tuning of
Disordered nodes (TTD), Tactics of Tuning of Link
actions or Node Position (TLP), Tactics of
Observation and Thinking (TOT), Tactics of
Restructuring of Nodes (TRN).</p>
      <p>Table 4 shows the percentage of each of the
knowledge change actions that occurred in each
cluster of knowledge change tactics. In three of the
tactics, TAC, TAS, and TAD, Accretion actions
were dominant, accounting for more than 70% of
all actions, and the difference was the modification
objects (either nodes or links, or the position of the
nodes). For example, in the sub-sequence of TAC,
users mainly added child nodes vertically. In TAS,
adding Sibling nodes actions were dominant in the
sub-sequence, which demonstrated a horizontal
expansion type of knowledge change pattern. In
TAD sub-sequences, users also frequently added
new nodes, but these new nodes were mostly
discorded nodes, neither child nodes, parent nodes,
nor sibling nodes. In these sub-sequences, users
may already have a certain amount of knowledge
points, and were checking to fix certain gaps or
deficiencies if there is any in their knowledge
structure.</p>
      <p>In another three tactics, TTS, TTD, and TTL,
Tuning was the dominant actions during the
subsequences, the occurrences were all above 50%.
When Tuning actions were conducted, users
usually modified, deleted or moved the detail nodes.
In the TTS sub-sequence, users consistently
modified the same node every time they worked on
the mind map, which showed an excelsior attitude
toward the knowledge structure. Besides
consistently modifying the same node, users in
TTD may modify different nodes and did not follow
any order in selecting the nodes to be modified, so
this tactic is named Tactics of Tuning of Disordered
nodes (TTD). Another type of Tuning dominant
tactic is called Tactics of Tuning of Link actions or
Node Position (TTL), in which the main actions
were to add or modify links or move the position of
some existing nodes. Such modifications were
mainly not to change the semantic meaning but
focusing on optimizing the structure.</p>
      <p>In terms of the TOT tactic, the occurrences of
Tuning and Observation actions were similar,
accounted for about 35% each, and the proportion
of Accretion was slightly lower (22.16%). This is
apparently a special type of tactic, in which users
often frequently observe the knowledge map, and
then modify the content of some nodes. Therefore,
this tactic is named as Tactics of Observation and
Thinking.</p>
      <p>The final type of tactic is called Tactics of
Restructuring of Nodes (TRN), in which the
percentage of Restructuring actions was
particularly high (about 43.31%), and this action
only occurred around 5% in other types of tactics.
In this tactic, users also conducted certain amount
of accretion and tuning. This may indicate that
restructuring type of knowledge change is least
frequently occurred during search, and this type of
knowledge change often occur together with
accretion and tuning.</p>
      <p>Tactics of Accretion of Child nodes (TAC)
Tactics of Accretion of Sibling nodes (TAS)
Tactics of Accretion of Disordered nodes (TAD)
Tactics of Tuning of Same nodes (TTS)
Tactics of Tuning of Disordered nodes (TTD)
Tactics of Tuning of Link actions or Node Position
(TTL)
Tactics of Observation and Thinking (TOT)</p>
      <p>Tactics of Restructuring of Nodes (TRN)</p>
    </sec>
    <sec id="sec-10">
      <title>5. Discussion</title>
      <p>The aim of this study is to reveal users’
knowledge change tactics base on the analysis of
users’ actions on mind maps during search. By
adopting the "Actions-Tactics-Strategies (ATS)"
research path, this study first examined all kinds of
actions that searchers could do on mind maps. Each
action (add, delete, modify, or observe) were
mapped to one of the conceptual change types:
Accretion, Tuning, Restructuring and Observation.</p>
      <p>The frequency analysis and during analysis
showed that Accretion was the most frequent
knowledge change type and it often took short time.
Such result is consistent to Rumelhart &amp; Norman
(1978) that Accretion is the most common form of
learning during search, which may not require high
cognitive load, and relatively easy for users to
accomplish. The frequency and duration of Tuning
are both at the medium level. Since Tuning may
involve weak structural change of knowledge and
require more thinking and interpretation, the
occurrence is fewer than that of Accretion, and the
duration is a bit longer. The knowledge structure is
important for users since they need to rely on the
structure to organize all the information they
acquired through searching, and after deciding the
structure, they seldom change it. Therefore,
Restructuring occurred least and last for the longest
time.</p>
      <p>With respect to the knowledge change positions,
results show that sibling nodes were the most
common nodes to be added or modified. This
implies that users often adopt a horizontal
expansion method when editing their knowledge
map. The second frequent change position the
disordered nodes, which were neither parent nodes,
child nodes nor sibling nodes. This may indicate
that when users were searching information, they
may not always be oriented by the pre-defined
knowledge structure, but often edit the knowledge
map according to the new information they
acquired through searching. Future research would
also examine the relationship between content of
webpages examined and the position of knowledge
change and how such relationship is related to
document usefulness.</p>
      <p>When analyzing knowledge change tactics, we
used sequence clustering methods on sub-sequence
of knowledge change actions and identified eight
types of knowledge change tactics. The benefits of
identification of knowledge change tactics is that it
could reveal a series of knowledge change actions
users have conducted, and examine how users
process the information they get through searching.
Among these eight types of tactics, three of them
were Accretion dominant: TAC, TAS, and TAD,
each demonstrated vertical depth, horizontal
expansion and gap fixing pattern of learning. The
first two tactics show certain sequence for
knowledge accretion, while the last tactic seems to
rely on the available new information they get from
searching. Future research could examine the
occurrence stage of these three tactics to see if the
TAC and TAS happen at the early stage and the
TAD happen at later stage of searching.</p>
      <p>There are also three types of tactics dominant by
Tuning, TTS, TTD, and TTL. In these tactics,
participants often modify the same node several
times consistently, or add/delete links between
nodes, or modify the content of nodes without
following any order.</p>
      <p>There is only one tactic that was dominant by
Restructuring, TRN. Restructuring is related to the
main knowledge structure and this structure may be
related to how users organize their thoughts and the
information they receive through searching. We
may speculate TRN tactics often occur at the
beginning and the end of the search and this will be
further validated in future studies.</p>
      <p>In future research, we will continue to connect
these knowledge change tactics with users’ search
behaviors to reveal how their search behaviors or
the content they read lead to different types of
knowledge change tactics. In addition, we will also
investigate the distribution of these knowledge
change tactics during task completion process to
summarize users’ knowledge change strategy, and
whether different strategies may lead to different
learning performance. The ultimate goal is to reveal
the most effective learning strategy or to provide
effective learning tools embedded in the search
system to help searchers achieve better learning
performance.</p>
    </sec>
    <sec id="sec-11">
      <title>6. Conclusion</title>
      <p>This study explored searchers’ knowledge
change patterns in the context of learning-related
tasks from a process perspective. We first coded
participants’ knowledge change actions in mind
maps, and found twenty-five types of knowledge
change actions. Then we used sequence clustering
methods and identified eight types of knowledge
change tactics. The findings are the basis for our
further exploration of searchers’ learning strategies
during the whole session, also present a complete
behavioral and cognitive picture of searchers’
knowledge change process, for search systems
providing assistance at different stages of searching
and learning.</p>
    </sec>
    <sec id="sec-12">
      <title>7. Acknowledgements</title>
      <p>This paper was supported by Natural Social
Science Foundation Project “Examination of the
Relationship between User Interaction Behavior and
Learning Effect in Learning Search” (#18BTQ090).</p>
    </sec>
    <sec id="sec-13">
      <title>8. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Bates</surname>
            ,
            <given-names>M. J.</given-names>
          </string-name>
          (
          <year>1979</year>
          ).
          <article-title>Information search tactics</article-title>
          .
          <source>Journal of the American Society for Information Science &amp; Technology</source>
          ,
          <volume>30</volume>
          (
          <issue>4</issue>
          ) :
          <fpage>205</fpage>
          -
          <lpage>214</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Belkin</surname>
            ,
            <given-names>N.J.</given-names>
          </string-name>
          (
          <year>1980</year>
          ).
          <article-title>Anomalous states of knowledge as a basis for information retrieval</article-title>
          .
          <source>Canadian Journal of Information and library Science</source>
          ,
          <volume>5</volume>
          ,
          <fpage>133</fpage>
          -
          <lpage>143</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Bhattacharya</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Gwizdka</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Measuring Learning During Search: Differences in Interactions, Eye-Gaze, and Semantic Similarity to Expert Knowledge</article-title>
          .
          <source>CHIIR '19: Proceedings of the 2019 Conference on Human Information Interaction and Retrieval, March</source>
          <year>2019</year>
          , pp
          <fpage>63</fpage>
          -
          <lpage>71</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Cole</surname>
            ,
            <given-names>M. J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hendahewa</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Belkin</surname>
            ,
            <given-names>N. J.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Shah</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>User activity patterns during information search</article-title>
          .
          <source>ACM Transactions on Information Systems</source>
          ,
          <volume>33</volume>
          (
          <issue>1</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>39</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Gadiraju</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dietze</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Holtz</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Analyzing knowledge gain of users in informational search sessions on the web</article-title>
          .
          <source>In Proceedings of the 2018 Conference on Human Information Interaction &amp; Retrieval</source>
          (pp.
          <fpage>2</fpage>
          -
          <lpage>11</lpage>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Hendahewa</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Shah</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>Segmental Analysis and Evaluation of User Focused Search Process</article-title>
          .
          <source>International Conference on Machine Learning &amp; Applications</source>
          . IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Jonassen</surname>
            ,
            <given-names>D.H.</given-names>
          </string-name>
          (
          <year>2000</year>
          ).
          <article-title>Computers as Mindtools for Schools: Engaging Critical Thinking</article-title>
          . Columbus,
          <string-name>
            <surname>OH</surname>
          </string-name>
          : Prentice-Hall.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Kelly</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2009</year>
          ).
          <article-title>Methods for evaluating interactive information retrieval systems with users</article-title>
          .
          <source>Foundations and Trends in Information Retrieval</source>
          ,
          <volume>3</volume>
          (
          <issue>1-2</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>224</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Kuhlthau</surname>
            ,
            <given-names>C. C.</given-names>
          </string-name>
          (
          <year>1991</year>
          ).
          <article-title>Inside the search process: Information seeking from the user's perspective</article-title>
          . JASIS&amp;T,
          <volume>42</volume>
          (
          <issue>5</issue>
          ),
          <fpage>361</fpage>
          -
          <lpage>371</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Marchionini</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>1995</year>
          ).
          <article-title>Information seeking in electronic environments</article-title>
          . New York: Cambridge University Press.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , Liu,
          <string-name>
            <given-names>C.</given-names>
            , &amp;
            <surname>Belkin</surname>
          </string-name>
          ,
          <string-name>
            <surname>N. J.</surname>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Investigation of users' knowledge change process in learning‐related search tasks</article-title>
          .
          <source>Proceedings of ASIS&amp;T</source>
          ,
          <volume>56</volume>
          (
          <issue>1</issue>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Belkin</surname>
            ,
            <given-names>N. J.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Searching vs. writing: factors affecting information use task performance</article-title>
          .
          <source>Proceedings of ASIS&amp;T</source>
          ,
          <volume>49</volume>
          (
          <issue>1</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Hagen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Völske</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gomoll</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>How Writers Search: Analyzing the Search and Writing Logs of Non-fictional Essays</article-title>
          .
          <source>In Proceedings of 2016 ACM Conference on Human Information Interaction and Retrieval</source>
          ,
          <volume>193</volume>
          -
          <fpage>202</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Rieh</surname>
            ,
            <given-names>S. Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Collins-Thompson</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hansen</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>H. J.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Towards searching as a learning process</article-title>
          .
          <source>Journal of Information Science</source>
          ,
          <volume>42</volume>
          (
          <issue>1</issue>
          ),
          <fpage>19</fpage>
          -
          <lpage>34</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Roy</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moraes</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Hauff</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>Exploring Users' Learning Gains within Search Sessions</article-title>
          .
          <source>In Proceedings of the 2020 Conference on Human Information Interaction and Retrieval</source>
          (pp.
          <fpage>432</fpage>
          -
          <lpage>436</lpage>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Rumelhart</surname>
            ,
            <given-names>D.E.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Norman</surname>
            ,
            <given-names>D.A.</given-names>
          </string-name>
          (
          <year>1978</year>
          ). Accretion, Tuning, and
          <article-title>Restructuring: Three Modes of Learning</article-title>
          , In Semantic Factors in Cognition,
          <string-name>
            <given-names>J. W.</given-names>
            <surname>Cotton</surname>
          </string-name>
          &amp; R. L. Klatzky (ed.), Lawrence Erlbaum and Associates, Hillsdale, NJ.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peng</surname>
            , J., Cheng,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>J..</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Knowledge Visualization for Self-Regulated Learning</article-title>
          .
          <source>Educational Technology &amp; Society</source>
          ,
          <volume>14</volume>
          (
          <issue>3</issue>
          ),
          <fpage>28</fpage>
          -
          <lpage>42</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gadiraju</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Holtz</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rokicki</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kemkes</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Dietze</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Predicting user knowledge gain in informational search sessions</article-title>
          .
          <source>In The 41st International ACM SIGIR Conference on Research &amp; Development in Information Retrieval</source>
          (pp.
          <fpage>75</fpage>
          -
          <lpage>84</lpage>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Soergel</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Process patterns and conceptual changes in knowledge representations during information seeking and sensemaking: a qualitative user study</article-title>
          .
          <source>Journal of Information Science</source>
          ,
          <volume>42</volume>
          (
          <issue>1</issue>
          ),
          <fpage>59</fpage>
          -
          <lpage>78</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>