SlideShare ist ein Scribd-Unternehmen logo
1 von 22
..a contextual computing approach may prove
a breakthrough in personalized search
efficiency..
November 2015
 Refers to the enhancement of a user’s interactions by understanding
the user, the context, and the applications and information being
used
 It’s about “actively adapting the computational environment - for each
and every user - at each point of computation”
 “Focuses on understanding the information consumption patterns of
each user, the various information foraging strategies and
applications they employ, and the nature of the information itself”
 A shift from “consensus relevancy” (relevancy for entire population
used for every person) to “personal relevancy” (relevancy is
determined for each individual)
 This shift to personal relevancy decreases the time it takes people to
find information
 Content-based approaches - using language to match a query with
results - this approach doesn’t help users determine which results are
actually worth reading
 Author-relevancy techniques - using citation and hyperlinks - sometimes
presents the problem of ‘authoring bias’ and/or ‘ranking bias’ (results
that are valued by authors are not necessarily those valued by the entire
population)
 Usage rank - this “leverages the actions of users to compute relevancy”
- the usage rank is computed from the frequency, recency, and/or
duration of interaction by users - usage ranks allow for changes in
relevancy over time to be determined
 All of the above techniques measure relevance “as a function of the
entire population of users”
 This does not acknowledge that “relevance is relative” for each user
 There needs to be a way to “take into account that different people find
different things relevant and that people’s interests and knowledge
change over time - “personal relevance”
 In order to personalize search, we need to combine at least
two different computational techniques - contextualization and
individualization
 Contextualization - “the interrelated conditions that occur
within an activity..includes factors like the nature of information
available, the information currently being examined, and the
applications in use”
 Individualization - “the totality of characteristics that
distinguishes an individual.. Uses the user’s goals, prior and
tacit knowledge, past information-seeking behaviors”
 Main ways to personalize a search are “query augmentation” and
“result processing”
 Query augmentation - when a user enters a query, the query can
be compared against the contextual information available to
determine if the query can be refined to include other terms
 Query augmentation can also be done by computing the
similarity between the query term and the user model - if the
query is on a topic the user has previously seen, the system can
reinforce the query with similar terms
 This more concise query is then shown to the user and
“submitted to a search engine for processing”
 Once the query has been augmented and processed by the
search engine, the results can be “individualized”
 The results being individualized - this means that the information
is filtered based upon information in the user’s model and/or
context
 The user model “can re-rank search results based upon the
similarity of the content of the pages in the results and the user’s
profile”
 Another processing method is to re-rank the
results based upon the “frequency, recency, or
duration of usage..providing users with the
ability to identify the most popular, faddish and
time-consuming pages they’ve seen”
 “Have Seen, Have Not Seen” - this features
allows new information to be identified and
return to information already seen”
 Designed to be a “generalized architecture for the
personalization of search across a variety of information
ecologies”
 The Outride client can be integrated into the sidebar of the
Internet - it “supports direct manipulation and has access to all
user interactions”
 Sidebar is split up into four separate information spaces -
Personal (personal hierarchy of each user’s links), Directory (a
catalog of links), History (user’s surf history), Web (search
results from the entire Web)
 The user models are computed from the content in these
information spaces in the sidebar
 Outride used eTesting Lbs to design a series of test to measure if the
Outride system actually succeeded in making searches faster and
easier to complete
 The elapsed time to successfully complete a search and the number
of interface actions (mouse clicks/number of entries entered) were
used as the measurements
 Participants performed 12 search tasks with Outride and a different
search engine
 Default user model was used for all participants
 Participants found the answers more quickly with Outride than with
any other search engine - on average, participants took 39 seconds
to complete the tasks using Outride and 75 seconds using Google
 Participants also needed fewer interface actions when using Outride
- 11 when using Outride and 21 using the other search engine
 Some of the scenarios contained tasks “directly
supported by the functionality provided by the
Outride system, creating an advantage against the
other search engines”
 Default profiles were used, instead of individualized
profiles - therefore, it did not “represent the test
participant’ actual surfing patterns, nor were the
participants intimately familiar with the content of the
profiles”
 Despite these issues, the “magnitude of the
difference between the Outride system and the
other engines is compelling”
 One problem is modeling a user’s changing
interests over time
 However, carefully designed interfaces can help
“alleviate inaccurate personalization and allow
users to control the extent of the personalization”
 Privacy issues are a problem since it is a system
that stores models based upon user’s interactions
with information
“When designing Web personalization
products, make sure you address all your
users”
By Udi Manber, Ash Patel, and John Robison
 This article discusses three different examples of
personalization on Yahoo! Including
 My Yahoo!
 Yahoo! Companion
 Inside Yahoo! Search
 My Yahoo! Is a customized personal copy of Yahoo!
 Users select from various models such as news,
stock prices, weather, and sports scores to put on
their Web page.
 Provides users with the latest information on every
subject, but with only the specific items they want to
know about.
 Personalization
 Users can do such things as chose certain TV channels to put in their TV
Guide
 Customized Content
 Example of this is a sports module that lists the teams in the user’s area after
obtaining that information from the user’s profile.
 Automatic Updates
 A My Yahoo! Option allows this page to automatically update at any user-
specified interval from 15 minutes to several hours
 Original Module Ability
 Modules can be selected from a long list, but can also be added by clicking on
a button at the original content page.
 Each module on a My Yahoo! Page also has an edit and remove button,
allowing users to manipulate their pages directly, without ever needing to visit
an edit/layout page.
 A browser’s embedded toolbar from which a user
can directly access most of Yahoo! features from
anywhere on the Web.
 Like a mini My Yahoo! that takes a small space at
the top of the page is always with you.
 The user interface is similar to any other
bookmark feature, but the difference is the
bookmarks are kept on the server (not simply
on the specific computer)
 Therefore changes that users make to their
toolbar will stay with users even if they switch
to a different computer
 Users have the ability to chose from several
toolbars (such as a regular one a stock
market one) and change them at any time
 Yahoo! like many other search engines tries to
personalize searches using information it is able
to obtain from the user
 It would be impossible for Yahoo! to customize
every search.
 If a user searches for the name of current movie,
Yahoo will show results for Yahoo! Movies, show an
image for the movie, the cast, and a pointer to a page
with current show times
 If the user had looked at showtimes on a page
previously and entered a zip code, Yahoo! can now
use that information to show the user movie times in
his or her own are
 Any company that collects private information must guard that
information with its life.
 Personal information about Yahoo! Is maintained in a specially
designed User Database (UDB) which was built on Yahoo!’s own
customized software.
 Yahoo! has data replication and distribution capabilities allowing
them to replicate and distribute the UDB over secure links to
remote locations in Asia and Europe
 Yahoo! has enlisted a security-audit company to evaluate our
procedures periodically and suggest necessary changes, as well
as employ several internal people devoted solely to privacy and
security issues.
 The issue of usability focuses mostly on the issue of predictability
 Personalization features that learn what user want and attempt to
satisfy them are hotly debated
 A weakness in these personalization features is unpredictability
 Example: A lot of people do not want customized news, they want
just the same news as everyone else
 Also getting news about cancer because a user some medical
journal on cancer in the past can confuse the user and even
jeopardize user trust and raise serious privacy concerns in the user’s
mind
 Any effective personalization feature should encourage
experimentation.
 Most users take what is given to them and never
customize.
 Even though companies like Yahoo! offer customized
pages for users, a great deal of effort must still go into
the default page.
 Companies should never underestimate power users
 Customization should follow you as much as possible
 People generally don’t understand the concept of
customization
 Make sure you address all your users
 Learn from users
 “Too many attempts have been made without sufficient
regard to what people really want, what they can use,
and how best it should fit their needs.”
 “A major challenge to large-scale personalization is to
lower the entry bar, making it easier for less-experienced
users to customize their pages, and making it clear to
novices that customization is possible.”

Weitere ähnliche Inhalte

Was ist angesagt?

Tagging - Can User Generated Content Improve Our Services?
Tagging - Can User Generated Content Improve Our Services?Tagging - Can User Generated Content Improve Our Services?
Tagging - Can User Generated Content Improve Our Services?
guestff5a190a
 
kdd2015-feed (1)
kdd2015-feed (1)kdd2015-feed (1)
kdd2015-feed (1)
Guy Lebanon
 

Was ist angesagt? (16)

Fuzzy Logic Based Recommender System
Fuzzy Logic Based Recommender SystemFuzzy Logic Based Recommender System
Fuzzy Logic Based Recommender System
 
Ijcet 06 10_004
Ijcet 06 10_004Ijcet 06 10_004
Ijcet 06 10_004
 
Social search
Social searchSocial search
Social search
 
Maede Kiani Sarkaleh, Mehregan Mahdavi and Mahsa Baniardalan
Maede Kiani Sarkaleh, Mehregan Mahdavi and Mahsa BaniardalanMaede Kiani Sarkaleh, Mehregan Mahdavi and Mahsa Baniardalan
Maede Kiani Sarkaleh, Mehregan Mahdavi and Mahsa Baniardalan
 
Introduction to Recommendation Systems
Introduction to Recommendation SystemsIntroduction to Recommendation Systems
Introduction to Recommendation Systems
 
A survey on recommendation system
A survey on recommendation systemA survey on recommendation system
A survey on recommendation system
 
Designing a recommender system based on social networks and location based se...
Designing a recommender system based on social networks and location based se...Designing a recommender system based on social networks and location based se...
Designing a recommender system based on social networks and location based se...
 
Incentive Architecture 1224362486736986 8
Incentive Architecture 1224362486736986 8Incentive Architecture 1224362486736986 8
Incentive Architecture 1224362486736986 8
 
Tagging - Can User Generated Content Improve Our Services?
Tagging - Can User Generated Content Improve Our Services?Tagging - Can User Generated Content Improve Our Services?
Tagging - Can User Generated Content Improve Our Services?
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
An Engaging Click ... or how can user engagement measurement inform web searc...
An Engaging Click ... or how can user engagement measurement inform web searc...An Engaging Click ... or how can user engagement measurement inform web searc...
An Engaging Click ... or how can user engagement measurement inform web searc...
 
Pxc3893553
Pxc3893553Pxc3893553
Pxc3893553
 
Smashing silos ia-ux-meetup-mar112014
Smashing silos ia-ux-meetup-mar112014Smashing silos ia-ux-meetup-mar112014
Smashing silos ia-ux-meetup-mar112014
 
IRJET - Venue Recommender for Events based on User Preferences
IRJET -  	  Venue Recommender for Events based on User PreferencesIRJET -  	  Venue Recommender for Events based on User Preferences
IRJET - Venue Recommender for Events based on User Preferences
 
kdd2015-feed (1)
kdd2015-feed (1)kdd2015-feed (1)
kdd2015-feed (1)
 
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
 

Ähnlich wie Search engine patterns

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Personalization of the Web Search
Personalization of the Web SearchPersonalization of the Web Search
Personalization of the Web Search
IJMER
 
Quest Trail: An Effective Approach for Construction of Personalized Search En...
Quest Trail: An Effective Approach for Construction of Personalized Search En...Quest Trail: An Effective Approach for Construction of Personalized Search En...
Quest Trail: An Effective Approach for Construction of Personalized Search En...
Editor IJCATR
 
Ucd Techniques - Shad MUN 2008
Ucd Techniques - Shad MUN 2008Ucd Techniques - Shad MUN 2008
Ucd Techniques - Shad MUN 2008
Patañjali Chary
 
Personalization of the Web Search
Personalization of the Web SearchPersonalization of the Web Search
Personalization of the Web Search
IJMER
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
vivatechijri
 

Ähnlich wie Search engine patterns (20)

Ac02411221125
Ac02411221125Ac02411221125
Ac02411221125
 
A NOVEL RESEARCH PAPER RECOMMENDATION SYSTEM
A NOVEL RESEARCH PAPER RECOMMENDATION SYSTEMA NOVEL RESEARCH PAPER RECOMMENDATION SYSTEM
A NOVEL RESEARCH PAPER RECOMMENDATION SYSTEM
 
I1037075
I1037075I1037075
I1037075
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Personalized web search using browsing history and domain knowledge
Personalized web search using browsing history and domain knowledgePersonalized web search using browsing history and domain knowledge
Personalized web search using browsing history and domain knowledge
 
Recommendation System Using Social Networking
Recommendation System Using Social Networking Recommendation System Using Social Networking
Recommendation System Using Social Networking
 
AN EFFECTIVE FRAMEWORK FOR GENERATING RECOMMENDATIONS
AN EFFECTIVE FRAMEWORK FOR GENERATING RECOMMENDATIONSAN EFFECTIVE FRAMEWORK FOR GENERATING RECOMMENDATIONS
AN EFFECTIVE FRAMEWORK FOR GENERATING RECOMMENDATIONS
 
G017415465
G017415465G017415465
G017415465
 
Sweeny group think-ias2015
Sweeny group think-ias2015Sweeny group think-ias2015
Sweeny group think-ias2015
 
Personalization of the Web Search
Personalization of the Web SearchPersonalization of the Web Search
Personalization of the Web Search
 
Quest Trail: An Effective Approach for Construction of Personalized Search En...
Quest Trail: An Effective Approach for Construction of Personalized Search En...Quest Trail: An Effective Approach for Construction of Personalized Search En...
Quest Trail: An Effective Approach for Construction of Personalized Search En...
 
Ucd Techniques - Shad MUN 2008
Ucd Techniques - Shad MUN 2008Ucd Techniques - Shad MUN 2008
Ucd Techniques - Shad MUN 2008
 
UCD Workshop - Shad MUN 2008
UCD Workshop - Shad MUN 2008UCD Workshop - Shad MUN 2008
UCD Workshop - Shad MUN 2008
 
Deriving concept absed user profile
Deriving concept absed user profileDeriving concept absed user profile
Deriving concept absed user profile
 
Personalization of the Web Search
Personalization of the Web SearchPersonalization of the Web Search
Personalization of the Web Search
 
HCI - Human.Computer.Interaction Project - CS 489 / CS 449 - University of Wa...
HCI - Human.Computer.Interaction Project - CS 489 / CS 449 - University of Wa...HCI - Human.Computer.Interaction Project - CS 489 / CS 449 - University of Wa...
HCI - Human.Computer.Interaction Project - CS 489 / CS 449 - University of Wa...
 
Analysis on Recommended System for Web Information Retrieval Using HMM
Analysis on Recommended System for Web Information Retrieval Using HMMAnalysis on Recommended System for Web Information Retrieval Using HMM
Analysis on Recommended System for Web Information Retrieval Using HMM
 
I017654651
I017654651I017654651
I017654651
 
IR UNIT V.docx
IR UNIT  V.docxIR UNIT  V.docx
IR UNIT V.docx
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Search engine patterns

  • 1. ..a contextual computing approach may prove a breakthrough in personalized search efficiency.. November 2015
  • 2.  Refers to the enhancement of a user’s interactions by understanding the user, the context, and the applications and information being used  It’s about “actively adapting the computational environment - for each and every user - at each point of computation”  “Focuses on understanding the information consumption patterns of each user, the various information foraging strategies and applications they employ, and the nature of the information itself”  A shift from “consensus relevancy” (relevancy for entire population used for every person) to “personal relevancy” (relevancy is determined for each individual)  This shift to personal relevancy decreases the time it takes people to find information
  • 3.  Content-based approaches - using language to match a query with results - this approach doesn’t help users determine which results are actually worth reading  Author-relevancy techniques - using citation and hyperlinks - sometimes presents the problem of ‘authoring bias’ and/or ‘ranking bias’ (results that are valued by authors are not necessarily those valued by the entire population)  Usage rank - this “leverages the actions of users to compute relevancy” - the usage rank is computed from the frequency, recency, and/or duration of interaction by users - usage ranks allow for changes in relevancy over time to be determined  All of the above techniques measure relevance “as a function of the entire population of users”  This does not acknowledge that “relevance is relative” for each user  There needs to be a way to “take into account that different people find different things relevant and that people’s interests and knowledge change over time - “personal relevance”
  • 4.  In order to personalize search, we need to combine at least two different computational techniques - contextualization and individualization  Contextualization - “the interrelated conditions that occur within an activity..includes factors like the nature of information available, the information currently being examined, and the applications in use”  Individualization - “the totality of characteristics that distinguishes an individual.. Uses the user’s goals, prior and tacit knowledge, past information-seeking behaviors”
  • 5.  Main ways to personalize a search are “query augmentation” and “result processing”  Query augmentation - when a user enters a query, the query can be compared against the contextual information available to determine if the query can be refined to include other terms  Query augmentation can also be done by computing the similarity between the query term and the user model - if the query is on a topic the user has previously seen, the system can reinforce the query with similar terms  This more concise query is then shown to the user and “submitted to a search engine for processing”  Once the query has been augmented and processed by the search engine, the results can be “individualized”  The results being individualized - this means that the information is filtered based upon information in the user’s model and/or context  The user model “can re-rank search results based upon the similarity of the content of the pages in the results and the user’s profile”
  • 6.  Another processing method is to re-rank the results based upon the “frequency, recency, or duration of usage..providing users with the ability to identify the most popular, faddish and time-consuming pages they’ve seen”  “Have Seen, Have Not Seen” - this features allows new information to be identified and return to information already seen”
  • 7.  Designed to be a “generalized architecture for the personalization of search across a variety of information ecologies”  The Outride client can be integrated into the sidebar of the Internet - it “supports direct manipulation and has access to all user interactions”  Sidebar is split up into four separate information spaces - Personal (personal hierarchy of each user’s links), Directory (a catalog of links), History (user’s surf history), Web (search results from the entire Web)  The user models are computed from the content in these information spaces in the sidebar
  • 8.  Outride used eTesting Lbs to design a series of test to measure if the Outride system actually succeeded in making searches faster and easier to complete  The elapsed time to successfully complete a search and the number of interface actions (mouse clicks/number of entries entered) were used as the measurements  Participants performed 12 search tasks with Outride and a different search engine  Default user model was used for all participants  Participants found the answers more quickly with Outride than with any other search engine - on average, participants took 39 seconds to complete the tasks using Outride and 75 seconds using Google  Participants also needed fewer interface actions when using Outride - 11 when using Outride and 21 using the other search engine
  • 9.  Some of the scenarios contained tasks “directly supported by the functionality provided by the Outride system, creating an advantage against the other search engines”  Default profiles were used, instead of individualized profiles - therefore, it did not “represent the test participant’ actual surfing patterns, nor were the participants intimately familiar with the content of the profiles”  Despite these issues, the “magnitude of the difference between the Outride system and the other engines is compelling”
  • 10.  One problem is modeling a user’s changing interests over time  However, carefully designed interfaces can help “alleviate inaccurate personalization and allow users to control the extent of the personalization”  Privacy issues are a problem since it is a system that stores models based upon user’s interactions with information
  • 11. “When designing Web personalization products, make sure you address all your users” By Udi Manber, Ash Patel, and John Robison
  • 12.  This article discusses three different examples of personalization on Yahoo! Including  My Yahoo!  Yahoo! Companion  Inside Yahoo! Search
  • 13.  My Yahoo! Is a customized personal copy of Yahoo!  Users select from various models such as news, stock prices, weather, and sports scores to put on their Web page.  Provides users with the latest information on every subject, but with only the specific items they want to know about.
  • 14.  Personalization  Users can do such things as chose certain TV channels to put in their TV Guide  Customized Content  Example of this is a sports module that lists the teams in the user’s area after obtaining that information from the user’s profile.  Automatic Updates  A My Yahoo! Option allows this page to automatically update at any user- specified interval from 15 minutes to several hours  Original Module Ability  Modules can be selected from a long list, but can also be added by clicking on a button at the original content page.  Each module on a My Yahoo! Page also has an edit and remove button, allowing users to manipulate their pages directly, without ever needing to visit an edit/layout page.
  • 15.  A browser’s embedded toolbar from which a user can directly access most of Yahoo! features from anywhere on the Web.  Like a mini My Yahoo! that takes a small space at the top of the page is always with you.
  • 16.  The user interface is similar to any other bookmark feature, but the difference is the bookmarks are kept on the server (not simply on the specific computer)  Therefore changes that users make to their toolbar will stay with users even if they switch to a different computer  Users have the ability to chose from several toolbars (such as a regular one a stock market one) and change them at any time
  • 17.  Yahoo! like many other search engines tries to personalize searches using information it is able to obtain from the user  It would be impossible for Yahoo! to customize every search.
  • 18.  If a user searches for the name of current movie, Yahoo will show results for Yahoo! Movies, show an image for the movie, the cast, and a pointer to a page with current show times  If the user had looked at showtimes on a page previously and entered a zip code, Yahoo! can now use that information to show the user movie times in his or her own are
  • 19.  Any company that collects private information must guard that information with its life.  Personal information about Yahoo! Is maintained in a specially designed User Database (UDB) which was built on Yahoo!’s own customized software.  Yahoo! has data replication and distribution capabilities allowing them to replicate and distribute the UDB over secure links to remote locations in Asia and Europe  Yahoo! has enlisted a security-audit company to evaluate our procedures periodically and suggest necessary changes, as well as employ several internal people devoted solely to privacy and security issues.
  • 20.  The issue of usability focuses mostly on the issue of predictability  Personalization features that learn what user want and attempt to satisfy them are hotly debated  A weakness in these personalization features is unpredictability  Example: A lot of people do not want customized news, they want just the same news as everyone else  Also getting news about cancer because a user some medical journal on cancer in the past can confuse the user and even jeopardize user trust and raise serious privacy concerns in the user’s mind  Any effective personalization feature should encourage experimentation.
  • 21.  Most users take what is given to them and never customize.  Even though companies like Yahoo! offer customized pages for users, a great deal of effort must still go into the default page.  Companies should never underestimate power users  Customization should follow you as much as possible  People generally don’t understand the concept of customization  Make sure you address all your users  Learn from users
  • 22.  “Too many attempts have been made without sufficient regard to what people really want, what they can use, and how best it should fit their needs.”  “A major challenge to large-scale personalization is to lower the entry bar, making it easier for less-experienced users to customize their pages, and making it clear to novices that customization is possible.”