SlideShare a Scribd company logo
1 of 20
INFORMATION SEEKING BEHAVIOR
IM-50
PRESENTED BY
ANDALEEB ASIM
AYESHA KHAN
NAILA ISHTIAQ
SYED AAMIR ALI NAQVI
OUTLINE
 History of Belkin Theory Anomalous State of
Knowledge
 Introduction
 What is Anomaly
 Background
 Comparison of Traditional and Belkin’s Models
 Applications
 Implication
 Conclusions
 References
ANOMALOUS STATE OF KNOWLEDGE
INTRODUCTION
 We are drowning in the overflow of data that are
being collected world-wide, while starving for
knowledge at the same time.
 Anomalous events occur relatively infrequently
 However, when they do occur, their consequences
can be quite dramatic and quite often in a negative
sense
WHAT ARE ANOMALIES?
 Anomaly is a pattern in the data that does
not conform to the expected behaviour
 Also referred to as outliers, exceptions,
peculiarities, surprise, etc.
HISTORY NICHOLAS BELKIN
• Nicholas J. Belkin is a Professor at the
school of Communication and information at
Rutgers University.
• Belkin is best know for his work on human-
centered Information Retrieval and
hypothesis of Anomalous State of
Knowledge(ASK)
• Belkin realized that in many cases, Users of
search systems are unable to precisely
formulate what they need. They miss some
vital Knowledge to formulate their queries.
BELKIN’S THEORY HISTORY
• In Such cases it is more suitable to attempt to
describe a user’s anomalous state of
knowledge than to ask the user to specify her
/his need as request to the system.
• Among the main themes of his research are
digital libraries; information-seeking behaviors;
and information retrieval system.
• Dr. Belkin was the chair of SIGIR in 1995-99
and the president of American Society for
Information Science and Technology (ASIS&T)
in 2005
BACKGROUND
 Information retrieval (IR) systems as presently
designed in terms of complete recall and precision or
complete user satisfaction.
 Traditional view of IR
THE INFORMATION RETRIEVAL CYCLE
Source
Selection
Search
Quer
y
Selection
Ranked List
Examination
Documents
Delivery
Documents
Query
Formulation
Resource
source reselection
System discovery
Vocabulary discovery
Concept discovery
Document discovery
BELKIN MODEL
ANOMALOUS STATE OF KNOWLEDGE
 Basic paradox:
 Information needs arise because the user doesn’t know
something: “an anomaly in his state of knowledge with
respect to the problem faced”
 Search systems are designed to satisfy these needs,
but the user needs to know what he is looking for
 However, if the user knows what he’s looking for, there
may not be a need to search in the first place
 Implication: computing “similarity” between queries
and documents is fundamentally wrong
 How do we resolve this paradox?
APPLICATIONS OF ANOMALY DETECTION
 Network intrusion detection
 Insurance / Credit card fraud detection
 Healthcare Informatics / Medical diagnostics
 Industrial Damage Detection
 Image Processing / Video surveillance
 Novel Topic Detection in Text Mining
 This new approach recognizes that a fundamental
element in the IR situation is the development of an
information need out of an inadequate state of
knowledge.
 Appropriate representation is consideration of the
information need as an 'anomalous state of knowledge'
(ASK).6,9
ANOMLOUS STATE OF KNOWLEDGE
 ‘’The ASK hypothesis is that an information need
arises from a recognized anomaly in the user's state
of knowledge concerning some topic or situation and
that, in general, the user is unable to specify precisely
what is needed to resolve that anomaly’’.
IMPLICATIONS
 The typical IR system now available, either
operational or experimental, depends on what we
call the 'best-match' principle.
 ASK = Non-Specifiability of need (Cognitive or
Linguistic)
 Cognitive Non- Specifiability
 Linguistic Non-Specifiability
OTHER THEORIES RELATED
 Unconscious Need by Robert S.Taylor (1968)
 Problematic Situation by Wersig (1971)
 Gaps by Dervin (1983)
RESEARCH METHODOLOGY
 Tape recording a number of interviews with
users of actual information systems.
 Adaptation and implementation of the text
analysis program developed by Belkin so as to
produce structural representations of this data.
 Obtaining the authors' /users' evaluations of
these representations, through the use of
questionnaires or interviews where appropriate.
CONCLUSIONS
 Anomaly detection can detect critical information in
data
 Highly applicable in various application domains
 Nature of anomaly detection problem is dependent
on the application domain
 Need different approaches to solve a particular
problem formulation
REFERENCES
 Ling, C., Li, C. Data mining for direct marketing:
Problems and solutions, KDD, 1998.
 Kubat M., Matwin, S., Addressing the Curse of
Imbalanced Training Sets: One-Sided Selection,
ICML 1997.
 N. Chawla et al., SMOTE: Synthetic Minority Over-
Sampling Technique, JAIR, 2002.
 W. Fan et al, Using Artificial Anomalies to Detect
Unknown and Known Network Intrusions, ICDM
2001
CONT.……
 N. Abe, et al, Outlier Detection by Active Learning,
KDD 2006
 C. Cardie, N. Howe, Improving Minority Class
Prediction Using Case specific feature weighting,
ICML 1997.
 J. Grzymala et al, An Approach to Imbalanced Data
Sets Based on Changing Rule Strength, AAAI
Workshop on Learning from Imbalanced Data Sets,
2000.
 George H. John. Robust linear discriminant trees.
AI&Statistics, 1995
CONT.……
 Barbara, D., Couto, J., Jajodia, S., and Wu, N.
Adam: a testbed for exploring the use of data
mining in intrusion detection. SIGMOD Rec., 2001
 Otey, M., Parthasarathy, S., Ghoting, A., Li, G.,
Narravula, S., and Panda, D. Towards nic-based
intrusion detection. KDD 2003
 He, Z., Xu, X., Huang, J. Z., and Deng, S. A
frequent pattern discovery method for outlier
detection. Web-Age Information Management, 726–
732, 2004
CONT.……
 Lee, W., Stolfo, S. J., and Mok, K. W. Adaptive
intrusion detection: A data mining approach.
Artificial Intelligence Review, 2000
 Qin, M. and Hwang, K. Frequent episode rules for
internet anomaly detection. In Proceedings of the
3rd IEEE International Symposium on Network
Computing and Applications, 2004
 Ide, T. and Kashima, H. Eigenspace-based
anomaly detection in computer systems. KDD,
2004
 Sun, J. et al., Less is more: Compact matrix
representation of large sparse graphs. ICDM 2007

More Related Content

What's hot

Controlled Vocabulary
Controlled VocabularyControlled Vocabulary
Controlled Vocabularyguest118a9a
 
ellis model of information seeking behaviour
ellis model of information seeking behaviourellis model of information seeking behaviour
ellis model of information seeking behaviournatashagandhi11
 
Absolute syntax
Absolute syntax Absolute syntax
Absolute syntax PALLAB DAS
 
Library consortia
Library consortia Library consortia
Library consortia Dheeraj Negi
 
Planning and implementation of library automation by Aman Kumar Kushwaha
Planning and implementation of library automation by Aman Kumar KushwahaPlanning and implementation of library automation by Aman Kumar Kushwaha
Planning and implementation of library automation by Aman Kumar KushwahaAMAN KUMAR KUSHWAHA
 
User education and information literacy - Innovative strategies and practices
User education and information literacy - Innovative strategies and practicesUser education and information literacy - Innovative strategies and practices
User education and information literacy - Innovative strategies and practicesFe Angela Verzosa
 
Dlis007 library automation
Dlis007 library automationDlis007 library automation
Dlis007 library automationsaniul rahaman
 
Information Consolidation
Information ConsolidationInformation Consolidation
Information ConsolidationKishor Sakariya
 
Functional Requirements For Bibliographic Records - FRBR
Functional Requirements For Bibliographic Records - FRBRFunctional Requirements For Bibliographic Records - FRBR
Functional Requirements For Bibliographic Records - FRBRIslamic University of Lebanon
 
INFORMATION SCIENCE
INFORMATION SCIENCEINFORMATION SCIENCE
INFORMATION SCIENCEharshaec
 
Information retrieval (introduction)
Information  retrieval (introduction) Information  retrieval (introduction)
Information retrieval (introduction) Primya Tamil
 
CATEGORIES OF USERS & THEIR NEEDS (IN CONTEXT OF LIBRARY)
CATEGORIES OF USERS & THEIR NEEDS (IN CONTEXT OF LIBRARY)CATEGORIES OF USERS & THEIR NEEDS (IN CONTEXT OF LIBRARY)
CATEGORIES OF USERS & THEIR NEEDS (IN CONTEXT OF LIBRARY)RUTVIPAREKH
 
METS(Metadata Encoding and Transmission Standard )
METS(Metadata Encoding and Transmission Standard )METS(Metadata Encoding and Transmission Standard )
METS(Metadata Encoding and Transmission Standard )Manu K M
 
Library management skills
Library management skillsLibrary management skills
Library management skillsARPANNASKAR4
 

What's hot (20)

Controlled Vocabulary
Controlled VocabularyControlled Vocabulary
Controlled Vocabulary
 
ellis model of information seeking behaviour
ellis model of information seeking behaviourellis model of information seeking behaviour
ellis model of information seeking behaviour
 
Information seeking process
Information seeking processInformation seeking process
Information seeking process
 
Electronic resource management system (ERM)
Electronic resource management system (ERM)Electronic resource management system (ERM)
Electronic resource management system (ERM)
 
Absolute syntax
Absolute syntax Absolute syntax
Absolute syntax
 
Library consortia
Library consortia Library consortia
Library consortia
 
Planning and implementation of library automation by Aman Kumar Kushwaha
Planning and implementation of library automation by Aman Kumar KushwahaPlanning and implementation of library automation by Aman Kumar Kushwaha
Planning and implementation of library automation by Aman Kumar Kushwaha
 
User education and information literacy - Innovative strategies and practices
User education and information literacy - Innovative strategies and practicesUser education and information literacy - Innovative strategies and practices
User education and information literacy - Innovative strategies and practices
 
Dlis007 library automation
Dlis007 library automationDlis007 library automation
Dlis007 library automation
 
Reference services in Libraries
Reference services in LibrariesReference services in Libraries
Reference services in Libraries
 
Information Consolidation
Information ConsolidationInformation Consolidation
Information Consolidation
 
Functional Requirements For Bibliographic Records - FRBR
Functional Requirements For Bibliographic Records - FRBRFunctional Requirements For Bibliographic Records - FRBR
Functional Requirements For Bibliographic Records - FRBR
 
INFORMATION SCIENCE
INFORMATION SCIENCEINFORMATION SCIENCE
INFORMATION SCIENCE
 
Information retrieval (introduction)
Information  retrieval (introduction) Information  retrieval (introduction)
Information retrieval (introduction)
 
OAI and OAI-PMH
OAI and OAI-PMHOAI and OAI-PMH
OAI and OAI-PMH
 
CATEGORIES OF USERS & THEIR NEEDS (IN CONTEXT OF LIBRARY)
CATEGORIES OF USERS & THEIR NEEDS (IN CONTEXT OF LIBRARY)CATEGORIES OF USERS & THEIR NEEDS (IN CONTEXT OF LIBRARY)
CATEGORIES OF USERS & THEIR NEEDS (IN CONTEXT OF LIBRARY)
 
bibliometrics
bibliometricsbibliometrics
bibliometrics
 
METS(Metadata Encoding and Transmission Standard )
METS(Metadata Encoding and Transmission Standard )METS(Metadata Encoding and Transmission Standard )
METS(Metadata Encoding and Transmission Standard )
 
citation analysis
citation analysiscitation analysis
citation analysis
 
Library management skills
Library management skillsLibrary management skills
Library management skills
 

Viewers also liked

Information Seeking Behavior
Information Seeking Behavior Information Seeking Behavior
Information Seeking Behavior Dheeraj Negi
 
Information Seeking Behaviour Models
Information Seeking Behaviour ModelsInformation Seeking Behaviour Models
Information Seeking Behaviour Models2548233
 
Information Behavior: Theories, Models & Studies (20091208)
Information Behavior: Theories, Models & Studies (20091208)Information Behavior: Theories, Models & Studies (20091208)
Information Behavior: Theories, Models & Studies (20091208)Charles (XXC) Chen
 
Information Seeking Theories And Models
Information Seeking Theories And ModelsInformation Seeking Theories And Models
Information Seeking Theories And Modelsguestab667e
 
Theories of Information Behavior
Theories of Information BehaviorTheories of Information Behavior
Theories of Information BehaviorLisa Metzer
 
Information Seeking Information Literacy
Information Seeking  Information LiteracyInformation Seeking  Information Literacy
Information Seeking Information LiteracyJohan Koren
 
Information seeking
Information seekingInformation seeking
Information seekingJohan Koren
 
Model and Theories of Information Seeking
Model and Theories of Information SeekingModel and Theories of Information Seeking
Model and Theories of Information SeekingPerpustakaan Al-Basuti
 
Teaching talk, never let me go
Teaching talk, never let me goTeaching talk, never let me go
Teaching talk, never let me gobganter
 
Information Seeking: Information Literact
Information Seeking: Information LiteractInformation Seeking: Information Literact
Information Seeking: Information LiteractJohan Koren
 
Style and Substance: The Information Seeking Behavior of Fashion Bloggers
Style and Substance: The Information Seeking Behavior of Fashion BloggersStyle and Substance: The Information Seeking Behavior of Fashion Bloggers
Style and Substance: The Information Seeking Behavior of Fashion BloggersMarie Sciangula
 
Information seeking behavior of Greek astronomers
Information seeking behavior of Greek astronomersInformation seeking behavior of Greek astronomers
Information seeking behavior of Greek astronomersGiannis Tsakonas
 
Wilson model
Wilson modelWilson model
Wilson modeljmisky33
 
Wilson 1981 model barriers
Wilson 1981 model  barriersWilson 1981 model  barriers
Wilson 1981 model barriersPallavi Belkar
 
Everyday lifeinformationseeking
Everyday lifeinformationseekingEveryday lifeinformationseeking
Everyday lifeinformationseekingkcarter14
 
Elis Model Every life info seeking
Elis Model Every life info seekingElis Model Every life info seeking
Elis Model Every life info seekingPunjab University
 
Presentation krikelas
Presentation krikelasPresentation krikelas
Presentation krikelasainol1789
 
User Experience Architecture For Discovery Applications
User Experience Architecture For Discovery ApplicationsUser Experience Architecture For Discovery Applications
User Experience Architecture For Discovery ApplicationsJoe Lamantia
 

Viewers also liked (20)

Information Seeking Behavior
Information Seeking Behavior Information Seeking Behavior
Information Seeking Behavior
 
Information Seeking Behaviour Models
Information Seeking Behaviour ModelsInformation Seeking Behaviour Models
Information Seeking Behaviour Models
 
Information Behavior: Theories, Models & Studies (20091208)
Information Behavior: Theories, Models & Studies (20091208)Information Behavior: Theories, Models & Studies (20091208)
Information Behavior: Theories, Models & Studies (20091208)
 
Information seeking ppt
Information seeking pptInformation seeking ppt
Information seeking ppt
 
Information Seeking Theories And Models
Information Seeking Theories And ModelsInformation Seeking Theories And Models
Information Seeking Theories And Models
 
Theories of Information Behavior
Theories of Information BehaviorTheories of Information Behavior
Theories of Information Behavior
 
Information Seeking Information Literacy
Information Seeking  Information LiteracyInformation Seeking  Information Literacy
Information Seeking Information Literacy
 
Information seeking
Information seekingInformation seeking
Information seeking
 
Model and Theories of Information Seeking
Model and Theories of Information SeekingModel and Theories of Information Seeking
Model and Theories of Information Seeking
 
Teaching talk, never let me go
Teaching talk, never let me goTeaching talk, never let me go
Teaching talk, never let me go
 
Information Seeking: Information Literact
Information Seeking: Information LiteractInformation Seeking: Information Literact
Information Seeking: Information Literact
 
Style and Substance: The Information Seeking Behavior of Fashion Bloggers
Style and Substance: The Information Seeking Behavior of Fashion BloggersStyle and Substance: The Information Seeking Behavior of Fashion Bloggers
Style and Substance: The Information Seeking Behavior of Fashion Bloggers
 
Information seeking behavior of Greek astronomers
Information seeking behavior of Greek astronomersInformation seeking behavior of Greek astronomers
Information seeking behavior of Greek astronomers
 
Wilson model
Wilson modelWilson model
Wilson model
 
Unit11mindmap
Unit11mindmapUnit11mindmap
Unit11mindmap
 
Wilson 1981 model barriers
Wilson 1981 model  barriersWilson 1981 model  barriers
Wilson 1981 model barriers
 
Everyday lifeinformationseeking
Everyday lifeinformationseekingEveryday lifeinformationseeking
Everyday lifeinformationseeking
 
Elis Model Every life info seeking
Elis Model Every life info seekingElis Model Every life info seeking
Elis Model Every life info seeking
 
Presentation krikelas
Presentation krikelasPresentation krikelas
Presentation krikelas
 
User Experience Architecture For Discovery Applications
User Experience Architecture For Discovery ApplicationsUser Experience Architecture For Discovery Applications
User Experience Architecture For Discovery Applications
 

Similar to Information seeking behavior

Fairness in Machine Learning
Fairness in Machine LearningFairness in Machine Learning
Fairness in Machine LearningDelip Rao
 
Presentation to the J. Craig Venter Institute, Dec. 2014
Presentation to the J. Craig Venter Institute, Dec. 2014Presentation to the J. Craig Venter Institute, Dec. 2014
Presentation to the J. Craig Venter Institute, Dec. 2014Mark Wilkinson
 
The experience of a multidisciplinary team in the early diagnosis of Alzheime...
The experience of a multidisciplinary team in the early diagnosis of Alzheime...The experience of a multidisciplinary team in the early diagnosis of Alzheime...
The experience of a multidisciplinary team in the early diagnosis of Alzheime...Decision Science Community
 
How do we know what we don’t know: Using the Neuroscience Information Framew...
How do we know what we don’t know:  Using the Neuroscience Information Framew...How do we know what we don’t know:  Using the Neuroscience Information Framew...
How do we know what we don’t know: Using the Neuroscience Information Framew...Maryann Martone
 
What is the reproducibility crisis in science and what can we do about it?
What is the reproducibility crisis in science and what can we do about it?What is the reproducibility crisis in science and what can we do about it?
What is the reproducibility crisis in science and what can we do about it?Dorothy Bishop
 
Accomplishments And Challenges In Bioinformatics
Accomplishments And Challenges In BioinformaticsAccomplishments And Challenges In Bioinformatics
Accomplishments And Challenges In BioinformaticsDereck Downing
 
Big Data & ML for Clinical Data
Big Data & ML for Clinical DataBig Data & ML for Clinical Data
Big Data & ML for Clinical DataPaul Agapow
 
[DSC Europe 23] Bojan Milunović - Essential Epistemic Opacity and AI - Driven...
[DSC Europe 23] Bojan Milunović - Essential Epistemic Opacity and AI - Driven...[DSC Europe 23] Bojan Milunović - Essential Epistemic Opacity and AI - Driven...
[DSC Europe 23] Bojan Milunović - Essential Epistemic Opacity and AI - Driven...DataScienceConferenc1
 
Age and gender detection using deep learning
Age and gender detection using deep learningAge and gender detection using deep learning
Age and gender detection using deep learningIRJET Journal
 
Canvas health talkjuly2015.key
Canvas health talkjuly2015.keyCanvas health talkjuly2015.key
Canvas health talkjuly2015.keyBrian Fisher
 
Bringing scientists to data to accelerate discoveries and improve human healt...
Bringing scientists to data to accelerate discoveries and improve human healt...Bringing scientists to data to accelerate discoveries and improve human healt...
Bringing scientists to data to accelerate discoveries and improve human healt...Sri Ambati
 
Everything you always wanted to know about Synthetic Data
Everything you always wanted to know about Synthetic DataEverything you always wanted to know about Synthetic Data
Everything you always wanted to know about Synthetic DataMOSTLY AI
 
Personal Identifiability of User Tracking Data | Whitepaper
Personal Identifiability of User Tracking Data | WhitepaperPersonal Identifiability of User Tracking Data | Whitepaper
Personal Identifiability of User Tracking Data | WhitepaperAlejandro Franceschi
 
Artificial Intelligence In Ophthalmology.pptx
Artificial Intelligence In Ophthalmology.pptxArtificial Intelligence In Ophthalmology.pptx
Artificial Intelligence In Ophthalmology.pptxGariyashee Lahkar
 
CSCI6530: Library Instruction for Research Methods in Computer Science
CSCI6530: Library Instruction for Research Methods in Computer ScienceCSCI6530: Library Instruction for Research Methods in Computer Science
CSCI6530: Library Instruction for Research Methods in Computer Scienceciakov
 
The BADAPPLE promiscuity plugin for BARD
The BADAPPLE promiscuity plugin for BARDThe BADAPPLE promiscuity plugin for BARD
The BADAPPLE promiscuity plugin for BARDJeremy Yang
 
A MACHINE LEARNING METHODOLOGY FOR DIAGNOSING CHRONIC KIDNEY DISEASE
A MACHINE LEARNING METHODOLOGY FOR DIAGNOSING CHRONIC KIDNEY DISEASEA MACHINE LEARNING METHODOLOGY FOR DIAGNOSING CHRONIC KIDNEY DISEASE
A MACHINE LEARNING METHODOLOGY FOR DIAGNOSING CHRONIC KIDNEY DISEASEIRJET Journal
 
Lifelogging, egocentric vision and health: how a small wearable camera can he...
Lifelogging, egocentric vision and health: how a small wearable camera can he...Lifelogging, egocentric vision and health: how a small wearable camera can he...
Lifelogging, egocentric vision and health: how a small wearable camera can he...Petia Radeva
 

Similar to Information seeking behavior (20)

Fairness in Machine Learning
Fairness in Machine LearningFairness in Machine Learning
Fairness in Machine Learning
 
Presentation to the J. Craig Venter Institute, Dec. 2014
Presentation to the J. Craig Venter Institute, Dec. 2014Presentation to the J. Craig Venter Institute, Dec. 2014
Presentation to the J. Craig Venter Institute, Dec. 2014
 
The experience of a multidisciplinary team in the early diagnosis of Alzheime...
The experience of a multidisciplinary team in the early diagnosis of Alzheime...The experience of a multidisciplinary team in the early diagnosis of Alzheime...
The experience of a multidisciplinary team in the early diagnosis of Alzheime...
 
How do we know what we don’t know: Using the Neuroscience Information Framew...
How do we know what we don’t know:  Using the Neuroscience Information Framew...How do we know what we don’t know:  Using the Neuroscience Information Framew...
How do we know what we don’t know: Using the Neuroscience Information Framew...
 
What is the reproducibility crisis in science and what can we do about it?
What is the reproducibility crisis in science and what can we do about it?What is the reproducibility crisis in science and what can we do about it?
What is the reproducibility crisis in science and what can we do about it?
 
Accomplishments And Challenges In Bioinformatics
Accomplishments And Challenges In BioinformaticsAccomplishments And Challenges In Bioinformatics
Accomplishments And Challenges In Bioinformatics
 
Big Data & ML for Clinical Data
Big Data & ML for Clinical DataBig Data & ML for Clinical Data
Big Data & ML for Clinical Data
 
[DSC Europe 23] Bojan Milunović - Essential Epistemic Opacity and AI - Driven...
[DSC Europe 23] Bojan Milunović - Essential Epistemic Opacity and AI - Driven...[DSC Europe 23] Bojan Milunović - Essential Epistemic Opacity and AI - Driven...
[DSC Europe 23] Bojan Milunović - Essential Epistemic Opacity and AI - Driven...
 
Age and gender detection using deep learning
Age and gender detection using deep learningAge and gender detection using deep learning
Age and gender detection using deep learning
 
ARTIFICIAL INTELLEGENCE
ARTIFICIAL INTELLEGENCEARTIFICIAL INTELLEGENCE
ARTIFICIAL INTELLEGENCE
 
Canvas health talkjuly2015.key
Canvas health talkjuly2015.keyCanvas health talkjuly2015.key
Canvas health talkjuly2015.key
 
Bringing scientists to data to accelerate discoveries and improve human healt...
Bringing scientists to data to accelerate discoveries and improve human healt...Bringing scientists to data to accelerate discoveries and improve human healt...
Bringing scientists to data to accelerate discoveries and improve human healt...
 
Everything you always wanted to know about Synthetic Data
Everything you always wanted to know about Synthetic DataEverything you always wanted to know about Synthetic Data
Everything you always wanted to know about Synthetic Data
 
Personal Identifiability of User Tracking Data | Whitepaper
Personal Identifiability of User Tracking Data | WhitepaperPersonal Identifiability of User Tracking Data | Whitepaper
Personal Identifiability of User Tracking Data | Whitepaper
 
Artificial Intelligence In Ophthalmology.pptx
Artificial Intelligence In Ophthalmology.pptxArtificial Intelligence In Ophthalmology.pptx
Artificial Intelligence In Ophthalmology.pptx
 
CSCI6530: Library Instruction for Research Methods in Computer Science
CSCI6530: Library Instruction for Research Methods in Computer ScienceCSCI6530: Library Instruction for Research Methods in Computer Science
CSCI6530: Library Instruction for Research Methods in Computer Science
 
Martone grethe
Martone gretheMartone grethe
Martone grethe
 
The BADAPPLE promiscuity plugin for BARD
The BADAPPLE promiscuity plugin for BARDThe BADAPPLE promiscuity plugin for BARD
The BADAPPLE promiscuity plugin for BARD
 
A MACHINE LEARNING METHODOLOGY FOR DIAGNOSING CHRONIC KIDNEY DISEASE
A MACHINE LEARNING METHODOLOGY FOR DIAGNOSING CHRONIC KIDNEY DISEASEA MACHINE LEARNING METHODOLOGY FOR DIAGNOSING CHRONIC KIDNEY DISEASE
A MACHINE LEARNING METHODOLOGY FOR DIAGNOSING CHRONIC KIDNEY DISEASE
 
Lifelogging, egocentric vision and health: how a small wearable camera can he...
Lifelogging, egocentric vision and health: how a small wearable camera can he...Lifelogging, egocentric vision and health: how a small wearable camera can he...
Lifelogging, egocentric vision and health: how a small wearable camera can he...
 

Recently uploaded

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Recently uploaded (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

Information seeking behavior

  • 1. INFORMATION SEEKING BEHAVIOR IM-50 PRESENTED BY ANDALEEB ASIM AYESHA KHAN NAILA ISHTIAQ SYED AAMIR ALI NAQVI
  • 2. OUTLINE  History of Belkin Theory Anomalous State of Knowledge  Introduction  What is Anomaly  Background  Comparison of Traditional and Belkin’s Models  Applications  Implication  Conclusions  References
  • 3. ANOMALOUS STATE OF KNOWLEDGE INTRODUCTION  We are drowning in the overflow of data that are being collected world-wide, while starving for knowledge at the same time.  Anomalous events occur relatively infrequently  However, when they do occur, their consequences can be quite dramatic and quite often in a negative sense
  • 4. WHAT ARE ANOMALIES?  Anomaly is a pattern in the data that does not conform to the expected behaviour  Also referred to as outliers, exceptions, peculiarities, surprise, etc.
  • 5. HISTORY NICHOLAS BELKIN • Nicholas J. Belkin is a Professor at the school of Communication and information at Rutgers University. • Belkin is best know for his work on human- centered Information Retrieval and hypothesis of Anomalous State of Knowledge(ASK) • Belkin realized that in many cases, Users of search systems are unable to precisely formulate what they need. They miss some vital Knowledge to formulate their queries.
  • 6. BELKIN’S THEORY HISTORY • In Such cases it is more suitable to attempt to describe a user’s anomalous state of knowledge than to ask the user to specify her /his need as request to the system. • Among the main themes of his research are digital libraries; information-seeking behaviors; and information retrieval system. • Dr. Belkin was the chair of SIGIR in 1995-99 and the president of American Society for Information Science and Technology (ASIS&T) in 2005
  • 7. BACKGROUND  Information retrieval (IR) systems as presently designed in terms of complete recall and precision or complete user satisfaction.  Traditional view of IR
  • 8. THE INFORMATION RETRIEVAL CYCLE Source Selection Search Quer y Selection Ranked List Examination Documents Delivery Documents Query Formulation Resource source reselection System discovery Vocabulary discovery Concept discovery Document discovery
  • 10. ANOMALOUS STATE OF KNOWLEDGE  Basic paradox:  Information needs arise because the user doesn’t know something: “an anomaly in his state of knowledge with respect to the problem faced”  Search systems are designed to satisfy these needs, but the user needs to know what he is looking for  However, if the user knows what he’s looking for, there may not be a need to search in the first place  Implication: computing “similarity” between queries and documents is fundamentally wrong  How do we resolve this paradox?
  • 11. APPLICATIONS OF ANOMALY DETECTION  Network intrusion detection  Insurance / Credit card fraud detection  Healthcare Informatics / Medical diagnostics  Industrial Damage Detection  Image Processing / Video surveillance  Novel Topic Detection in Text Mining
  • 12.  This new approach recognizes that a fundamental element in the IR situation is the development of an information need out of an inadequate state of knowledge.  Appropriate representation is consideration of the information need as an 'anomalous state of knowledge' (ASK).6,9 ANOMLOUS STATE OF KNOWLEDGE  ‘’The ASK hypothesis is that an information need arises from a recognized anomaly in the user's state of knowledge concerning some topic or situation and that, in general, the user is unable to specify precisely what is needed to resolve that anomaly’’.
  • 13. IMPLICATIONS  The typical IR system now available, either operational or experimental, depends on what we call the 'best-match' principle.  ASK = Non-Specifiability of need (Cognitive or Linguistic)  Cognitive Non- Specifiability  Linguistic Non-Specifiability
  • 14. OTHER THEORIES RELATED  Unconscious Need by Robert S.Taylor (1968)  Problematic Situation by Wersig (1971)  Gaps by Dervin (1983)
  • 15. RESEARCH METHODOLOGY  Tape recording a number of interviews with users of actual information systems.  Adaptation and implementation of the text analysis program developed by Belkin so as to produce structural representations of this data.  Obtaining the authors' /users' evaluations of these representations, through the use of questionnaires or interviews where appropriate.
  • 16. CONCLUSIONS  Anomaly detection can detect critical information in data  Highly applicable in various application domains  Nature of anomaly detection problem is dependent on the application domain  Need different approaches to solve a particular problem formulation
  • 17. REFERENCES  Ling, C., Li, C. Data mining for direct marketing: Problems and solutions, KDD, 1998.  Kubat M., Matwin, S., Addressing the Curse of Imbalanced Training Sets: One-Sided Selection, ICML 1997.  N. Chawla et al., SMOTE: Synthetic Minority Over- Sampling Technique, JAIR, 2002.  W. Fan et al, Using Artificial Anomalies to Detect Unknown and Known Network Intrusions, ICDM 2001
  • 18. CONT.……  N. Abe, et al, Outlier Detection by Active Learning, KDD 2006  C. Cardie, N. Howe, Improving Minority Class Prediction Using Case specific feature weighting, ICML 1997.  J. Grzymala et al, An Approach to Imbalanced Data Sets Based on Changing Rule Strength, AAAI Workshop on Learning from Imbalanced Data Sets, 2000.  George H. John. Robust linear discriminant trees. AI&Statistics, 1995
  • 19. CONT.……  Barbara, D., Couto, J., Jajodia, S., and Wu, N. Adam: a testbed for exploring the use of data mining in intrusion detection. SIGMOD Rec., 2001  Otey, M., Parthasarathy, S., Ghoting, A., Li, G., Narravula, S., and Panda, D. Towards nic-based intrusion detection. KDD 2003  He, Z., Xu, X., Huang, J. Z., and Deng, S. A frequent pattern discovery method for outlier detection. Web-Age Information Management, 726– 732, 2004
  • 20. CONT.……  Lee, W., Stolfo, S. J., and Mok, K. W. Adaptive intrusion detection: A data mining approach. Artificial Intelligence Review, 2000  Qin, M. and Hwang, K. Frequent episode rules for internet anomaly detection. In Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications, 2004  Ide, T. and Kashima, H. Eigenspace-based anomaly detection in computer systems. KDD, 2004  Sun, J. et al., Less is more: Compact matrix representation of large sparse graphs. ICDM 2007