An Evaluative Model for Information Retrieval System Evaluation: A Usercentered Approach
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 7
Abstract
The key technology for knowledge management that guarantees access to large corpora of both structured and unstructured data is Information retrieval (IR) Systems. The ones commonly used on an everyday basis are search engines. This study developed and validated an evaluative model from user’s perspective meant to assess these systems using the user-centered approach. Items used and validated in other related studies were used to elicit responses from over 250 users. The reliability and validity of the measurement instrument (MI) was demonstrated using statistics such as internal consistency, composite reliability and convergent validity. After assessing the reliability and validity of the MI, the resultant evaluative model was estimated for goodness-of-fit using the structural equation modeling (SEM) technique. Results confirmed that the suggested model is valid and will be useful to researchers who wish to use it. Thus, this study suggests both the parameters and methods employed to formulate the model for use in user-centered studies for the evaluation of IR system. Both the evaluative model, factor analytic methods of data analysis, could be used to understand and present more factors (parameters) that will be usable for IR system evaluation using the user-centered approach.
Authors and Affiliations
Bernard I. Akhigbe , Babajide S. Afolabi, , James I. Udo, , Emmanuel R. Adagunodo
Cloud Computing: Securing Client Data Storage
Within cloud computing environment, vibrant useful resource part and reallocation tend to be important, helpful and ultimately promote capital investment returns. This paper covers method inside situation associated with...
Accident Emergency Response And Routing Software (AERARS) using Genetic Algorithm
AERARS is a response and routing software for accident emergency requirement. A method has been proposed in this project for using a genetic algorithm to find the shortest route between a source and a destination. It mak...
A New Image Steganography Approach for Information Security Using Gray Level Images in Spatial Domain
A new image steganography method for hiding data using Gray Level Images in Spatial Domain is proposed in this paper. This method uses the 5th, 6th and 7th bits of pixel value for insertion and retrieval of message by us...
Performance Evaluation of Density-Based Outlier Detection on High Dimensional Data
Outlier detection is a task that finds objects that are considerably dissimilar, exceptional or inconsistent with respect to the remaining data. Outlier detection has wide applications which include data analysis, financ...
Adaptability of IEEE 802.15.4(Zigbee) Protocol for Wireless Sensor network
The IEEE 802.15.4/Zigbee protocol stack has been considered as a promising technology for Wireless Sensor Networks (WSN). IEEE 802.15.4 Low-Rate Wireless Personal Area Network (WPAN) standard specifies the lower protocol...