SlideShare a Scribd company logo
1 of 20
INFORMATION SEEKING BEHAVIOR
IM-50
PRESENTED BY
ANDALEEB ASIM
AYESHA KHAN
NAILA ISHTIAQ
SYED AAMIR ALI NAQVI
OUTLINE
 History of Belkin Theory Anomalous State of
Knowledge
 Introduction
 What is Anomaly
 Background
 Comparison of Traditional and Belkin’s Models
 Applications
 Implication
 Conclusions
 References
ANOMALOUS STATE OF KNOWLEDGE
INTRODUCTION
 We are drowning in the overflow of data that are
being collected world-wide, while starving for
knowledge at the same time.
 Anomalous events occur relatively infrequently
 However, when they do occur, their consequences
can be quite dramatic and quite often in a negative
sense
WHAT ARE ANOMALIES?
 Anomaly is a pattern in the data that does
not conform to the expected behaviour
 Also referred to as outliers, exceptions,
peculiarities, surprise, etc.
HISTORY NICHOLAS BELKIN
• Nicholas J. Belkin is a Professor at the
school of Communication and information at
Rutgers University.
• Belkin is best know for his work on human-
centered Information Retrieval and
hypothesis of Anomalous State of
Knowledge(ASK)
• Belkin realized that in many cases, Users of
search systems are unable to precisely
formulate what they need. They miss some
vital Knowledge to formulate their queries.
BELKIN’S THEORY HISTORY
• In Such cases it is more suitable to attempt to
describe a user’s anomalous state of
knowledge than to ask the user to specify her
/his need as request to the system.
• Among the main themes of his research are
digital libraries; information-seeking behaviors;
and information retrieval system.
• Dr. Belkin was the chair of SIGIR in 1995-99
and the president of American Society for
Information Science and Technology (ASIS&T)
in 2005
BACKGROUND
 Information retrieval (IR) systems as presently
designed in terms of complete recall and precision or
complete user satisfaction.
 Traditional view of IR
THE INFORMATION RETRIEVAL CYCLE
Source
Selection
Search
Quer
y
Selection
Ranked List
Examination
Documents
Delivery
Documents
Query
Formulation
Resource
source reselection
System discovery
Vocabulary discovery
Concept discovery
Document discovery
BELKIN MODEL
ANOMALOUS STATE OF KNOWLEDGE
 Basic paradox:
 Information needs arise because the user doesn’t know
something: “an anomaly in his state of knowledge with
respect to the problem faced”
 Search systems are designed to satisfy these needs,
but the user needs to know what he is looking for
 However, if the user knows what he’s looking for, there
may not be a need to search in the first place
 Implication: computing “similarity” between queries
and documents is fundamentally wrong
 How do we resolve this paradox?
APPLICATIONS OF ANOMALY DETECTION
 Network intrusion detection
 Insurance / Credit card fraud detection
 Healthcare Informatics / Medical diagnostics
 Industrial Damage Detection
 Image Processing / Video surveillance
 Novel Topic Detection in Text Mining
 This new approach recognizes that a fundamental
element in the IR situation is the development of an
information need out of an inadequate state of
knowledge.
 Appropriate representation is consideration of the
information need as an 'anomalous state of knowledge'
(ASK).6,9
ANOMLOUS STATE OF KNOWLEDGE
 ‘’The ASK hypothesis is that an information need
arises from a recognized anomaly in the user's state
of knowledge concerning some topic or situation and
that, in general, the user is unable to specify precisely
what is needed to resolve that anomaly’’.
IMPLICATIONS
 The typical IR system now available, either
operational or experimental, depends on what we
call the 'best-match' principle.
 ASK = Non-Specifiability of need (Cognitive or
Linguistic)
 Cognitive Non- Specifiability
 Linguistic Non-Specifiability
OTHER THEORIES RELATED
 Unconscious Need by Robert S.Taylor (1968)
 Problematic Situation by Wersig (1971)
 Gaps by Dervin (1983)
RESEARCH METHODOLOGY
 Tape recording a number of interviews with
users of actual information systems.
 Adaptation and implementation of the text
analysis program developed by Belkin so as to
produce structural representations of this data.
 Obtaining the authors' /users' evaluations of
these representations, through the use of
questionnaires or interviews where appropriate.
CONCLUSIONS
 Anomaly detection can detect critical information in
data
 Highly applicable in various application domains
 Nature of anomaly detection problem is dependent
on the application domain
 Need different approaches to solve a particular
problem formulation
REFERENCES
 Ling, C., Li, C. Data mining for direct marketing:
Problems and solutions, KDD, 1998.
 Kubat M., Matwin, S., Addressing the Curse of
Imbalanced Training Sets: One-Sided Selection,
ICML 1997.
 N. Chawla et al., SMOTE: Synthetic Minority Over-
Sampling Technique, JAIR, 2002.
 W. Fan et al, Using Artificial Anomalies to Detect
Unknown and Known Network Intrusions, ICDM
2001
CONT.……
 N. Abe, et al, Outlier Detection by Active Learning,
KDD 2006
 C. Cardie, N. Howe, Improving Minority Class
Prediction Using Case specific feature weighting,
ICML 1997.
 J. Grzymala et al, An Approach to Imbalanced Data
Sets Based on Changing Rule Strength, AAAI
Workshop on Learning from Imbalanced Data Sets,
2000.
 George H. John. Robust linear discriminant trees.
AI&Statistics, 1995
CONT.……
 Barbara, D., Couto, J., Jajodia, S., and Wu, N.
Adam: a testbed for exploring the use of data
mining in intrusion detection. SIGMOD Rec., 2001
 Otey, M., Parthasarathy, S., Ghoting, A., Li, G.,
Narravula, S., and Panda, D. Towards nic-based
intrusion detection. KDD 2003
 He, Z., Xu, X., Huang, J. Z., and Deng, S. A
frequent pattern discovery method for outlier
detection. Web-Age Information Management, 726–
732, 2004
CONT.……
 Lee, W., Stolfo, S. J., and Mok, K. W. Adaptive
intrusion detection: A data mining approach.
Artificial Intelligence Review, 2000
 Qin, M. and Hwang, K. Frequent episode rules for
internet anomaly detection. In Proceedings of the
3rd IEEE International Symposium on Network
Computing and Applications, 2004
 Ide, T. and Kashima, H. Eigenspace-based
anomaly detection in computer systems. KDD,
2004
 Sun, J. et al., Less is more: Compact matrix
representation of large sparse graphs. ICDM 2007

More Related Content

What's hot

METS(Metadata Encoding and Transmission Standard )
METS(Metadata Encoding and Transmission Standard )METS(Metadata Encoding and Transmission Standard )
METS(Metadata Encoding and Transmission Standard )
Manu K M
 
Informetrics final
Informetrics finalInformetrics final
Informetrics final
Aamir Abbas
 
ellis model of information seeking behaviour
ellis model of information seeking behaviourellis model of information seeking behaviour
ellis model of information seeking behaviour
natashagandhi11
 
Current trends in library science research
Current trends in library science researchCurrent trends in library science research
Current trends in library science research
VISHNUMAYA R S
 

What's hot (20)

Design and development of subject gateways with special reference to lisgateway
Design and development of subject  gateways with special reference to lisgatewayDesign and development of subject  gateways with special reference to lisgateway
Design and development of subject gateways with special reference to lisgateway
 
Web scale discovery service
Web scale discovery serviceWeb scale discovery service
Web scale discovery service
 
Indexing language concept types and characteristics
Indexing language concept types and characteristicsIndexing language concept types and characteristics
Indexing language concept types and characteristics
 
METS(Metadata Encoding and Transmission Standard )
METS(Metadata Encoding and Transmission Standard )METS(Metadata Encoding and Transmission Standard )
METS(Metadata Encoding and Transmission Standard )
 
Information literacy model
Information literacy modelInformation literacy model
Information literacy model
 
Webometrics
WebometricsWebometrics
Webometrics
 
Information Retrieval
Information RetrievalInformation Retrieval
Information Retrieval
 
Informetrics final
Informetrics finalInformetrics final
Informetrics final
 
Bibliometrics law
Bibliometrics lawBibliometrics law
Bibliometrics law
 
Information seeking ppt
Information seeking pptInformation seeking ppt
Information seeking ppt
 
National programmes in information literacy
National programmes in information literacyNational programmes in information literacy
National programmes in information literacy
 
ellis model of information seeking behaviour
ellis model of information seeking behaviourellis model of information seeking behaviour
ellis model of information seeking behaviour
 
Structure of subject lit ppt
Structure of subject lit pptStructure of subject lit ppt
Structure of subject lit ppt
 
Metadata
MetadataMetadata
Metadata
 
Information Seeking Behavior
Information Seeking Behavior Information Seeking Behavior
Information Seeking Behavior
 
Information Consolidation
Information ConsolidationInformation Consolidation
Information Consolidation
 
Evaluation of library automation software
Evaluation of library automation softwareEvaluation of library automation software
Evaluation of library automation software
 
Metadata: A concept
Metadata: A conceptMetadata: A concept
Metadata: A concept
 
International Digital Library Initiatives
International Digital Library InitiativesInternational Digital Library Initiatives
International Digital Library Initiatives
 
Current trends in library science research
Current trends in library science researchCurrent trends in library science research
Current trends in library science research
 

Viewers also liked

Information Seeking Behaviour Models
Information Seeking Behaviour ModelsInformation Seeking Behaviour Models
Information Seeking Behaviour Models
2548233
 
Information Seeking Theories And Models
Information Seeking Theories And ModelsInformation Seeking Theories And Models
Information Seeking Theories And Models
guestab667e
 
Information Seeking Information Literacy
Information Seeking  Information LiteracyInformation Seeking  Information Literacy
Information Seeking Information Literacy
Johan Koren
 
Teaching talk, never let me go
Teaching talk, never let me goTeaching talk, never let me go
Teaching talk, never let me go
bganter
 
Information Seeking: Information Literact
Information Seeking: Information LiteractInformation Seeking: Information Literact
Information Seeking: Information Literact
Johan Koren
 
Wilson 1981 model barriers
Wilson 1981 model  barriersWilson 1981 model  barriers
Wilson 1981 model barriers
Pallavi Belkar
 
Everyday lifeinformationseeking
Everyday lifeinformationseekingEveryday lifeinformationseeking
Everyday lifeinformationseeking
kcarter14
 

Viewers also liked (20)

Information Seeking Behaviour Models
Information Seeking Behaviour ModelsInformation Seeking Behaviour Models
Information Seeking Behaviour Models
 
Information Behavior: Theories, Models & Studies (20091208)
Information Behavior: Theories, Models & Studies (20091208)Information Behavior: Theories, Models & Studies (20091208)
Information Behavior: Theories, Models & Studies (20091208)
 
Information Seeking Theories And Models
Information Seeking Theories And ModelsInformation Seeking Theories And Models
Information Seeking Theories And Models
 
Theories of Information Behavior
Theories of Information BehaviorTheories of Information Behavior
Theories of Information Behavior
 
Information Seeking Information Literacy
Information Seeking  Information LiteracyInformation Seeking  Information Literacy
Information Seeking Information Literacy
 
Information seeking
Information seekingInformation seeking
Information seeking
 
Model and Theories of Information Seeking
Model and Theories of Information SeekingModel and Theories of Information Seeking
Model and Theories of Information Seeking
 
User studies: enquiry foundations and methodological considerations
User studies: enquiry foundations and methodological considerationsUser studies: enquiry foundations and methodological considerations
User studies: enquiry foundations and methodological considerations
 
Teaching talk, never let me go
Teaching talk, never let me goTeaching talk, never let me go
Teaching talk, never let me go
 
Information Seeking: Information Literact
Information Seeking: Information LiteractInformation Seeking: Information Literact
Information Seeking: Information Literact
 
Style and Substance: The Information Seeking Behavior of Fashion Bloggers
Style and Substance: The Information Seeking Behavior of Fashion BloggersStyle and Substance: The Information Seeking Behavior of Fashion Bloggers
Style and Substance: The Information Seeking Behavior of Fashion Bloggers
 
Information seeking behavior of Greek astronomers
Information seeking behavior of Greek astronomersInformation seeking behavior of Greek astronomers
Information seeking behavior of Greek astronomers
 
Wilson model
Wilson modelWilson model
Wilson model
 
Unit11mindmap
Unit11mindmapUnit11mindmap
Unit11mindmap
 
Wilson 1981 model barriers
Wilson 1981 model  barriersWilson 1981 model  barriers
Wilson 1981 model barriers
 
Everyday lifeinformationseeking
Everyday lifeinformationseekingEveryday lifeinformationseeking
Everyday lifeinformationseeking
 
Elis Model Every life info seeking
Elis Model Every life info seekingElis Model Every life info seeking
Elis Model Every life info seeking
 
Presentation krikelas
Presentation krikelasPresentation krikelas
Presentation krikelas
 
User Experience Architecture For Discovery Applications
User Experience Architecture For Discovery ApplicationsUser Experience Architecture For Discovery Applications
User Experience Architecture For Discovery Applications
 
Seed endeca
Seed endecaSeed endeca
Seed endeca
 

Similar to Information seeking behavior

[DSC Europe 23] Bojan Milunović - Essential Epistemic Opacity and AI - Driven...
[DSC Europe 23] Bojan Milunović - Essential Epistemic Opacity and AI - Driven...[DSC Europe 23] Bojan Milunović - Essential Epistemic Opacity and AI - Driven...
[DSC Europe 23] Bojan Milunović - Essential Epistemic Opacity and AI - Driven...
DataScienceConferenc1
 
Canvas health talkjuly2015.key
Canvas health talkjuly2015.keyCanvas health talkjuly2015.key
Canvas health talkjuly2015.key
Brian Fisher
 
Lifelogging, egocentric vision and health: how a small wearable camera can he...
Lifelogging, egocentric vision and health: how a small wearable camera can he...Lifelogging, egocentric vision and health: how a small wearable camera can he...
Lifelogging, egocentric vision and health: how a small wearable camera can he...
Petia Radeva
 

Similar to Information seeking behavior (20)

Fairness in Machine Learning
Fairness in Machine LearningFairness in Machine Learning
Fairness in Machine Learning
 
Presentation to the J. Craig Venter Institute, Dec. 2014
Presentation to the J. Craig Venter Institute, Dec. 2014Presentation to the J. Craig Venter Institute, Dec. 2014
Presentation to the J. Craig Venter Institute, Dec. 2014
 
The experience of a multidisciplinary team in the early diagnosis of Alzheime...
The experience of a multidisciplinary team in the early diagnosis of Alzheime...The experience of a multidisciplinary team in the early diagnosis of Alzheime...
The experience of a multidisciplinary team in the early diagnosis of Alzheime...
 
How do we know what we don’t know: Using the Neuroscience Information Framew...
How do we know what we don’t know:  Using the Neuroscience Information Framew...How do we know what we don’t know:  Using the Neuroscience Information Framew...
How do we know what we don’t know: Using the Neuroscience Information Framew...
 
What is the reproducibility crisis in science and what can we do about it?
What is the reproducibility crisis in science and what can we do about it?What is the reproducibility crisis in science and what can we do about it?
What is the reproducibility crisis in science and what can we do about it?
 
Accomplishments And Challenges In Bioinformatics
Accomplishments And Challenges In BioinformaticsAccomplishments And Challenges In Bioinformatics
Accomplishments And Challenges In Bioinformatics
 
Big Data & ML for Clinical Data
Big Data & ML for Clinical DataBig Data & ML for Clinical Data
Big Data & ML for Clinical Data
 
[DSC Europe 23] Bojan Milunović - Essential Epistemic Opacity and AI - Driven...
[DSC Europe 23] Bojan Milunović - Essential Epistemic Opacity and AI - Driven...[DSC Europe 23] Bojan Milunović - Essential Epistemic Opacity and AI - Driven...
[DSC Europe 23] Bojan Milunović - Essential Epistemic Opacity and AI - Driven...
 
Age and gender detection using deep learning
Age and gender detection using deep learningAge and gender detection using deep learning
Age and gender detection using deep learning
 
ARTIFICIAL INTELLEGENCE
ARTIFICIAL INTELLEGENCEARTIFICIAL INTELLEGENCE
ARTIFICIAL INTELLEGENCE
 
Canvas health talkjuly2015.key
Canvas health talkjuly2015.keyCanvas health talkjuly2015.key
Canvas health talkjuly2015.key
 
Bringing scientists to data to accelerate discoveries and improve human healt...
Bringing scientists to data to accelerate discoveries and improve human healt...Bringing scientists to data to accelerate discoveries and improve human healt...
Bringing scientists to data to accelerate discoveries and improve human healt...
 
Everything you always wanted to know about Synthetic Data
Everything you always wanted to know about Synthetic DataEverything you always wanted to know about Synthetic Data
Everything you always wanted to know about Synthetic Data
 
Personal Identifiability of User Tracking Data | Whitepaper
Personal Identifiability of User Tracking Data | WhitepaperPersonal Identifiability of User Tracking Data | Whitepaper
Personal Identifiability of User Tracking Data | Whitepaper
 
Artificial Intelligence In Ophthalmology.pptx
Artificial Intelligence In Ophthalmology.pptxArtificial Intelligence In Ophthalmology.pptx
Artificial Intelligence In Ophthalmology.pptx
 
CSCI6530: Library Instruction for Research Methods in Computer Science
CSCI6530: Library Instruction for Research Methods in Computer ScienceCSCI6530: Library Instruction for Research Methods in Computer Science
CSCI6530: Library Instruction for Research Methods in Computer Science
 
Martone grethe
Martone gretheMartone grethe
Martone grethe
 
The BADAPPLE promiscuity plugin for BARD
The BADAPPLE promiscuity plugin for BARDThe BADAPPLE promiscuity plugin for BARD
The BADAPPLE promiscuity plugin for BARD
 
A MACHINE LEARNING METHODOLOGY FOR DIAGNOSING CHRONIC KIDNEY DISEASE
A MACHINE LEARNING METHODOLOGY FOR DIAGNOSING CHRONIC KIDNEY DISEASEA MACHINE LEARNING METHODOLOGY FOR DIAGNOSING CHRONIC KIDNEY DISEASE
A MACHINE LEARNING METHODOLOGY FOR DIAGNOSING CHRONIC KIDNEY DISEASE
 
Lifelogging, egocentric vision and health: how a small wearable camera can he...
Lifelogging, egocentric vision and health: how a small wearable camera can he...Lifelogging, egocentric vision and health: how a small wearable camera can he...
Lifelogging, egocentric vision and health: how a small wearable camera can he...
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Information seeking behavior

  • 1. INFORMATION SEEKING BEHAVIOR IM-50 PRESENTED BY ANDALEEB ASIM AYESHA KHAN NAILA ISHTIAQ SYED AAMIR ALI NAQVI
  • 2. OUTLINE  History of Belkin Theory Anomalous State of Knowledge  Introduction  What is Anomaly  Background  Comparison of Traditional and Belkin’s Models  Applications  Implication  Conclusions  References
  • 3. ANOMALOUS STATE OF KNOWLEDGE INTRODUCTION  We are drowning in the overflow of data that are being collected world-wide, while starving for knowledge at the same time.  Anomalous events occur relatively infrequently  However, when they do occur, their consequences can be quite dramatic and quite often in a negative sense
  • 4. WHAT ARE ANOMALIES?  Anomaly is a pattern in the data that does not conform to the expected behaviour  Also referred to as outliers, exceptions, peculiarities, surprise, etc.
  • 5. HISTORY NICHOLAS BELKIN • Nicholas J. Belkin is a Professor at the school of Communication and information at Rutgers University. • Belkin is best know for his work on human- centered Information Retrieval and hypothesis of Anomalous State of Knowledge(ASK) • Belkin realized that in many cases, Users of search systems are unable to precisely formulate what they need. They miss some vital Knowledge to formulate their queries.
  • 6. BELKIN’S THEORY HISTORY • In Such cases it is more suitable to attempt to describe a user’s anomalous state of knowledge than to ask the user to specify her /his need as request to the system. • Among the main themes of his research are digital libraries; information-seeking behaviors; and information retrieval system. • Dr. Belkin was the chair of SIGIR in 1995-99 and the president of American Society for Information Science and Technology (ASIS&T) in 2005
  • 7. BACKGROUND  Information retrieval (IR) systems as presently designed in terms of complete recall and precision or complete user satisfaction.  Traditional view of IR
  • 8. THE INFORMATION RETRIEVAL CYCLE Source Selection Search Quer y Selection Ranked List Examination Documents Delivery Documents Query Formulation Resource source reselection System discovery Vocabulary discovery Concept discovery Document discovery
  • 10. ANOMALOUS STATE OF KNOWLEDGE  Basic paradox:  Information needs arise because the user doesn’t know something: “an anomaly in his state of knowledge with respect to the problem faced”  Search systems are designed to satisfy these needs, but the user needs to know what he is looking for  However, if the user knows what he’s looking for, there may not be a need to search in the first place  Implication: computing “similarity” between queries and documents is fundamentally wrong  How do we resolve this paradox?
  • 11. APPLICATIONS OF ANOMALY DETECTION  Network intrusion detection  Insurance / Credit card fraud detection  Healthcare Informatics / Medical diagnostics  Industrial Damage Detection  Image Processing / Video surveillance  Novel Topic Detection in Text Mining
  • 12.  This new approach recognizes that a fundamental element in the IR situation is the development of an information need out of an inadequate state of knowledge.  Appropriate representation is consideration of the information need as an 'anomalous state of knowledge' (ASK).6,9 ANOMLOUS STATE OF KNOWLEDGE  ‘’The ASK hypothesis is that an information need arises from a recognized anomaly in the user's state of knowledge concerning some topic or situation and that, in general, the user is unable to specify precisely what is needed to resolve that anomaly’’.
  • 13. IMPLICATIONS  The typical IR system now available, either operational or experimental, depends on what we call the 'best-match' principle.  ASK = Non-Specifiability of need (Cognitive or Linguistic)  Cognitive Non- Specifiability  Linguistic Non-Specifiability
  • 14. OTHER THEORIES RELATED  Unconscious Need by Robert S.Taylor (1968)  Problematic Situation by Wersig (1971)  Gaps by Dervin (1983)
  • 15. RESEARCH METHODOLOGY  Tape recording a number of interviews with users of actual information systems.  Adaptation and implementation of the text analysis program developed by Belkin so as to produce structural representations of this data.  Obtaining the authors' /users' evaluations of these representations, through the use of questionnaires or interviews where appropriate.
  • 16. CONCLUSIONS  Anomaly detection can detect critical information in data  Highly applicable in various application domains  Nature of anomaly detection problem is dependent on the application domain  Need different approaches to solve a particular problem formulation
  • 17. REFERENCES  Ling, C., Li, C. Data mining for direct marketing: Problems and solutions, KDD, 1998.  Kubat M., Matwin, S., Addressing the Curse of Imbalanced Training Sets: One-Sided Selection, ICML 1997.  N. Chawla et al., SMOTE: Synthetic Minority Over- Sampling Technique, JAIR, 2002.  W. Fan et al, Using Artificial Anomalies to Detect Unknown and Known Network Intrusions, ICDM 2001
  • 18. CONT.……  N. Abe, et al, Outlier Detection by Active Learning, KDD 2006  C. Cardie, N. Howe, Improving Minority Class Prediction Using Case specific feature weighting, ICML 1997.  J. Grzymala et al, An Approach to Imbalanced Data Sets Based on Changing Rule Strength, AAAI Workshop on Learning from Imbalanced Data Sets, 2000.  George H. John. Robust linear discriminant trees. AI&Statistics, 1995
  • 19. CONT.……  Barbara, D., Couto, J., Jajodia, S., and Wu, N. Adam: a testbed for exploring the use of data mining in intrusion detection. SIGMOD Rec., 2001  Otey, M., Parthasarathy, S., Ghoting, A., Li, G., Narravula, S., and Panda, D. Towards nic-based intrusion detection. KDD 2003  He, Z., Xu, X., Huang, J. Z., and Deng, S. A frequent pattern discovery method for outlier detection. Web-Age Information Management, 726– 732, 2004
  • 20. CONT.……  Lee, W., Stolfo, S. J., and Mok, K. W. Adaptive intrusion detection: A data mining approach. Artificial Intelligence Review, 2000  Qin, M. and Hwang, K. Frequent episode rules for internet anomaly detection. In Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications, 2004  Ide, T. and Kashima, H. Eigenspace-based anomaly detection in computer systems. KDD, 2004  Sun, J. et al., Less is more: Compact matrix representation of large sparse graphs. ICDM 2007