You are on page 1of 28

Cognitive Strategies and Learning from the

World Wide Web


[ ] Janette R, Mill
Michael J, Hannafin

The purpose of this study was to identify the [] During the past decade, information systems
strategies used by adult learners in an open- have undergone a metamorphosis. Emerging
ended hypermedia information system. Four hypermedia information systems, such as the
participants were drawn from an introductory World Wide Web (WWW), have engendered a
educational technology course that incorpo- myriad of applications. While such systems pro-
rated a unit on telecommunications. Partici- mote access to a wide-reaching range of
pants completed a survey measuring reported resources, they do not, by design, facilitate learn-
knowledge in three domains (metacognitive, ing. The purpose of this study was to identify the
system, and subject) as well as self-efficacy strategies used by adults seeking to address
toward technology. They then identified a per- individually defined learning needs via the
sonal search topic, and searched the World World Wide Web.
Wide Web for information using Netscape®,
thinking aloud as they searched. Data collec-
tion and analysis occurred in several phases: PERSPECTIVES O N
scripting the search, reading through the data, EMERGING INFORMATION SYSTEMS
segmenting according to research question,
encoding, and aggregating. Three major find-
Historically, information systems directed users
ings related to hypermedia information sys-
to, and guided in retrieval of, limited text-based
tems resulted from this study: (a) a variety of
resources. Electronic card catalogs, for example,
strategies are used by learners; (b) self-
indexed a host of library resources such as
reported knowledge appears to affect the strate-
abstracts and citations. Original source materials
gies used; and (c) perceptions of disorientation
were rarely available; instead, users were
and perceived self-efficacy influence the strate-
informed where source documents were located
gies used. Implications related to emerging
(Marchionini, 1995).
information technologies and open-ended learn-
ing environments are considered. Some have suggested that emerging
hypermedia information systems such as the
WWW signal a new era in both information sys-
tem organization and in how education is con-
ceptualized and delivered (Dede, 1996; Gilbert,
1996). The Web has expanded information sys-
tems to include on-line access to a theoretically
unlimited number and type of multimedia doc-
uments, dynamic indexing among documents,
and powerful search engines that assist users in
identifying relevant documents (Williams,
1995). According to proponents, learners can
iteratively generate problems or needs, develop
and refine search strategies, locate related doeu-

ETR&D,Vol. 45, No. 4, 1997,pp. 37-64 ISSN1042-1629 37


38 ETR&D,Vo145, No. 4

ments, compare and contrast perspectives, inter- learning depends upon the extent to which rele-
pret the individual documents, generate new vant pedagogy is embedded within a given Web
inferences and interpretations, and reconcile site, or scaffolding is provided (Hannafin, Hill,
new with existing understanding (O'Neil, 1995; & Land, 1997). The WWW has significant poten-
Spindler, 1995). tial; the extent to which the Web or individual
sites support open-ended learning, however,
Concerns have been expressed, however,
depends upon their design and/or context of
regarding learning applications of the WWW
(see, e.g., Batson & Bass, 1996). Anyone can pub- their application.
lish information on the Web on virtually any
topic; consequently, little quality control of
source documents exists. Likewise, Web search FACTORS INFLUENCING OPEN-ENDED
engines are designed to assist users in identify- LEARNING VIA THE WWW
ing and accessing source documents, not to
assess the appropriateness of the documents for In planning the present study, we conducted an
individual needs. Users are typically provided analysis of the literature on information sys-
lists of Web resources with a system-assigned tems, including instructional systems design,
relevance rating, but the lists are generated via psychology, communication, computer science,
very general Boolean search algorithms which and information science, to identify elements
often prove misleading or of little use. Signifi- likely to influence user-centered, open-ended
cant strides have been made in search engine learning. The review revealed five key factors:
technology, but search engines are thus far (a) metacognitive knowledge, (b) perceived ori-
unable to locate information in a particular con- entation, (c) perceived self-efficacy, (d) system
text for a particular use (Hildreth, 1987). knowledge, and (e) prior subject knowledge.
Research on information retrieval suggests These are summarized in Table 1 and intro-
problems in three key areas: (a) users, (b) sys- duced briefly in the following section. They are
tems, and (c) information (see Walster, 1996, for described in the context of the present study in
a detailed review). Systems and users are unable the "Method" section.
to establish a natural language dialog, resulting Metacognitive knowledge refers to awareness of
in communications breakdowns. Therefore, it is one's cognitive processes. These strategies
difficult to support unique learner goals, inten- include scanning, searching, questioning,
tions, and understanding. Users are often unable chunking, generating hypotheses, and making
to provide adequate search criteria; systems, in decisions (Flavell, 1979; Kozma, 1988). Meta-
turn, return "hits" based upon limited search cognitive knowledge enables an individual to
engine intelligence and source data inadequa- reflect, evaluate, and direct cognitive activities
cies. As a result, inaccurate and misleading effectively (Perkins, Simmons, & Tishman,
sources are identified by information systems as 1990). The decision-making and management
"relevant" which ultimately complicate or con- demands of open learning via the WWW can be
found learning. especially significant (Jacobson, Maouri, Mishra,
Still, the educational potential of the WWW & Kolar, 1995; Yang, 1993). Metacognitive
for enabling the creation of open-ended learning knowledge presumably influences how or if
environments (OELEs) has generated consider- individuals identify and monitor their learning
able interest. OELEs are learner-centered sys- needs--skills considered fundamental to suc-
tems that facilitate the unique efforts of cessful open learning (Hannafin et al., 1997).
individuals versus transmitting uniform infor- Weak metacognitive knowledge and skill may
mation to a class or group (Hannafin, Hall, limit learners in defining learning needs, evalu-
Land, & Hill, 1994). OELEs are designed to facil- ating available resources, and revising their
itate problem solving, critical thinking, and per- learning strategies, while strong metacognitive
spective building as learners engage resource- knowledge and skill are likely to improve learn-
rich environments (Land & Hannafin, 1996). The ing via the information system.
extent to which the WWW supports open-ended Perceived orientation refers to awareness of
COGNITIVESTRATEGIESAND LEARNINGFROMTHEWWW 39

Table 1 [ ] Stages of knowing a n d understanding

KnowledgeArea Beginning End


Metacognitive Low--Learners trained to think in High--Display divergent thinking and
linear manner in directed environ- views from multiple perspectives (angling).
ments with little to no control.
Orientation Low--Learners experience being High--Learners are aware of where they are,
"lost in hyperspace." how they got there, and how to get back to
previous locations within the system.
Self-Efficacy Low--Learners do not feel confident High--Learners are not only confident in
in their ability to use the system. using the system, but are also willing to try
new things with the system.
System Limited--Learners may have used a Expanded--In addition to the manner in
computer, but likely not to have used which the tool was designed, learners will
the particular system, especially in the also be utilizing the system in divergent
manner in which it is being utilized. ways.
Subject Limited--Novice or basic under- Enhanced--Increase in understanding.
standing of the domain area. Movement toward expertise in area.

location within a system, as well as awareness of high self-efficacy, in contrast, tend to be more
the strategies and activities needed. The ability persistent in their search and more confident in
to recognize location, or gain "bearings" in a their ability to locate the resources they seek
system, influences success in open systems (Murphy, 1988).
(Beasley & Waugh, 1995). Disorientation, or feel- System knowledge refers to prior knowledge of
ing "lost in hyperspace," hampers learning and experience with a particular information
because of the loss of bearings (Tripp & Roby, system or a system closely related in structure
1990). While some have found that modest dis- and function. High system knowledge enables
orientation m a y create a challenge for the strategic and sophisticated uses of search and
learner (see, e.g., Mayes, Kibby, & Anderson, retrieval features. Low system knowledge often
1990), high-levels of disorientation have proven reflects a lack of awareness of how approaches
debilitating (Marchionini, 1988). can be augmented, as well as h o w features
Perceived se~-efficacy refers to a personal judg- might extend approaches and perceptions (for
ment of one's capability to execute actions further discussion, see Marchionini, 1995). Weil,
required to perform. According to Bandura Rosen, and Wugalter (1990) concluded that,
(1977), self-efficacy influences choice: "Given lacking prior system knowledge and experience,
appropriate skills and adequate incentives, effi- users experienced difficulty communicating
cacy expectations are a major determinant of with and through computers. The lack of an ade-
people's choice of activities, how much effort quate mental model m a y also minimize the
they wilt expend, and how long they will sustain value of extensive domain knowledge during
effort in dealing with stressful situations" searches (Park & Hannafin, 1993). On the other
(Bandura, in Oliver & Shapiro, 1993, p. 194). Per- hand, experienced users, such as reference
ceived self-efficacy toward emerging hyperme- librarians, generally evolve sophisticated tech-
dia information systems are likely to influence niques despite the lack of extensive domain
how, or if, participants use the system (Ashton, knowledge (Marchionini, 1995), enabling them
1984; Hill, Smith, & Mann, 1987; Jorde-Bloom, to maneuver through complex information sys-
1988; Kinzie & Delcourt, 1991; Kinzie, Delcourt, tems to locate needed information.
& Powers, 1994). Low self-efficacy reflects a lack Prior subject knowledge refers to existing
of confidence in the ability to manipulate the knowledge and experience related to the
system to achieve desired results. Consequently, domain in which one searches. According to
users are more likely to accept rather than ques- Ausubel (1963), " . . . an individual's (existing)
tion system-generated information. Users with organization, stability, and clarity of knowledge
40 ETR&D, Vo145, No. 4

in a particular subject matter field at any given 3. Does perceived self-efficacy affect the strate-
time, is the principal factor influencing the learn- gies employed?
ing and retention of meaningful new material" 4. Does prior system knowledge affect the strat-
(p. 217). Independent of medium, learners with egies employed?
extensive content-related prior knowledge con-
5. Does prior subject knowledge affect the strat-
sistently out-perform their counterparts with
egies employed?
limited prior knowledge (Langer & Nicolich,
1981; Recht & Leslie, 1988). High domain knowl-
edge enables learners to better anticipate, as well METHOD
as to identify, connections among terminology
Selection of Participants
than does limited domain knowledge, thus
enabling learners to generate powerful strate-
Fifteen volunteers, comprising current and pro-
gies that are largely independent of specific
spective educators enrolled in a university-level
information systems (Shin, Schallert, & Savenye,
technology for educators course, initially partic-
1994). Information systems, in effect, extend
ipated. The participants reflected varied experi-
inquiry via schema-driven searches in a familiar
ences and backgrounds, induding preservice
domain rather than assist in the acquisition of
teachers, as well as current pre-K through
enabling conceptual knowledge or skill
postsecondary educators. Since the course was
(Marchionini, 1995).
an elective, participants entered with high levels
of interest in and motivation for applying tech-
IMPLICATIONS FOR PRESENTSTUDY nology in their work. They were awarded extra
credit for participating.
While considerable interest and effort has been Following data collection (i.e., Presearch Sur-
focused on the design and structure of user-cen- vey through Stimulated Postsearch Interview)
tered information systems (see, e.g., Kuhlthau, from all study volunteers, the initial pool of par-
1991), several questions remain related to the ticipants was reduced to four, including two
influence of varied background knowledge, males and two females, for in-depth analysis.
metacognitive knowledge, perceived self-effi- They were selected because of the diversity and
cacy, and prior experience. We need to better richness of the data presented in the various
understand the processes employed as learners instruments, and to minimize redundant infor-
search, as well as the search process itself, to mation across participants. The purpose was not
improve the utility of systems such as the WWW to generalize to a broader population, but to
for open learning. The goals of this study were characterize both diversity and similarity of
to better understand how individual learning individual strategy use within a given context
goals were pursued using the WWW, and to (Whitt, 1991). Selection ensured diversity across
suggest methods to guide their design and use the attributes under study and provided the
in open-learning environments. Because of the most complete information on the question-
dynamic interactions inherent in open learning naires, interviews, and study procedures. Partic-
via the WWW, qualitative methods involving ipants are described in greater detail in the
multiple data sources and diverse techniques "Findings and Discussion" section.
were employed.
A primary organizing question was
addressed: What strategies are employed by The Course: Technology for Teachers
learners in open-ended hypermedia information
systems? Five secondary questions framed the The course philosophy reflected several OELE
study: premises:
1. Does metacognitive knowledge affect the • First, within educational seti~gs, technolo-
strategies employed? gies are tools to be used to build or construct.
2. Does perceived orientation affect the strate- The course focused on the creation of prod-
gies employed? ucts that were keyed to identified needs.
COGNITIVESTRATEGIESAND LEARNINGFROMTHEWWW 41

• Second, productive use is influenced by con- lions of Web sites and Web pages, and readily
text, audience, and activity. Course problems enables access to several search engines to locate
were anchored in everyday classroom teach- information (e.g., Yahoo@). Finally, control is
ing and learning contexts; various technolo- user centered, in terms of the needs defined,
gies could support student, teacher, and information requested, and steps t a k e n to
community uses. Open learning is student retrieve information.
centered. Participants established and
updated individual personally relevant goals
to be pursued as well as the steps needed to Measures
attain them.
• Third, concrete, relevant contexts establish Both quantitative and qualitative instruments
both everyday referents and the meaningful- and techniques were used to gather self-
ness of learning activities. In this course, indi- reported knowledge: presearch surveys, think-
viduals identified specific problems, based aloud protocols, audit trails, postsearch
on their work sites, to be addressed using the questionnaires, and stimulated postsearch inter-
technologies and resources available in the views. The instruments were used to designate
course. participants as high, medium, or low in the five
• Finally, the underlying processes associated attributes studied and to corroborate par-
with technology applications are critical for ticipants' verbalizations during their search.
developing understanding because existing
technologies will inevitably be replaced.
Presearch Survey
Therefore, problem solving using available
tools was stressed rather than mastery of spe- The presearch survey measured participants'
cific software and hardware. initial perceptions in the three knowledge
domains (metacognitive, subject, system) and
their perceived self-efficacy. The survey estab-
Internet and WWW lished a baseline from which to evaluate per-
ceived progress. Twenty-two questions were
A major focus of the course was the WWW. used to gather information related to the four
Most participants were aware of the Web, areas. The questions included both short answer
though few understood what it was or how it and rating questions.
could be used in an educational setting. The Metacognitive knowledge was ascertained
WWW supports the transmission of multime- via a pizza-making exercise, during which par-
dia, such as pictures, sound, and motion, as well ticipants identified steps to be taken in making a
as traditional textual information. While not pizza, and responded to four short-answer ques-
inherently an OELE, learning via the Web can be tions such as, "Were you aware of monitoring
scaffolded using features such as learner-gener- what you were doing as you were making the
ated problems and tools that enable the user to pizza?" This was done to indicate participant
choose, query, and link d o c u m e n t s - condi- awareness of their ongoing metacognitive pro-
tions provided via the Technology for Teachers cesses during the exercise. Responses to these
course. questions were used to indicate participants' ini-
The WWW and Netscape@ have several char- tial perceptions of metacognitive knowledge.
acteristics that made them appropriate for the Four questions on the presearch survey were
study. First, both the Web and Netscape@ are related to participants' prior subject knowledge.
common components of open information sys- Participants were asked to explain their search task
tems and are widely available in schools. Sec- (i.e., "The problem I am trying to solve is:...") and
ond, the WWW requires that the learner to rate their knowledge of the topic area in
generate the strategies needed to plan, imple- which they were searching for information. For
ment, and evaluate search results. Netscape@ example, participants rated themselves on a
supports these activities, enabling access to mil- scale of novice to expert in response to the follow-
42 ETR&D,Vo145, No. 4

ing question: "How would you rate your knowl- trails provided a record of actions and system
edge of the topic area you will be searching?" responses associated with presumed cognitive
The presearch survey contained seven ques- processes.
tions related to system knowledge. The ques-
tions were related to information retrieval
systems in general (e.g., ERIC) and hypertext/ Postsearch Questionnaires
hypermedia systems (e.g., Netscape®). Partici-
Like the presearch survey, the postsearch ques-
pants indicated their experience with informa-
tionnaire measured participant estimates of the
tion-retrieval technologies (from never used to
three knowledge areas (metacognitive, subject,
daily use) in the following system knowledge
system) and perceived self-efficacy. In addition,
stem: "Indicate the degree to which you have
the questionnaire queried participants for strate-
used the following technologies: General infor-
gies used and perceived orientation during their
mation retrieval databases (e.g., PsychLit, ERIC).
searches. The postsearch questionnaire enabled
These ratings were used to indicate the
the perceived changes from the start to comple-
participants' perceived levels of system knowl-
tion of a search session to be studied. Seventeen
edge.
short-response questions were included on the
Seven questions on the survey were related questionnaire. Though the majority of the ques-
to self-efficacy. For example, participants rated tions were keyed to the five research areas
from strongly disagree to strongly agree the follow- (metacognitive knowledge: 2 questions; subject
ing self-efficacy stem: "I am not the type to do knowledge: 2 questions; system knowledge: 3
well with computer technologies." Responses on questions; perceived orientation: 2 questions;
these questions were used to indicate the perceived self-efficacy: 3 questions), the ques-
participants~ levels of perceived self-efficacy. tions were open-ended in nature, leading to
responses that often overlapped across the
research areas. For example, questions were
Think-Aloud Protocols
posed related to system knowledge and system
Think-aloud protocols, verbalizations of en- orientation: "Did you feel like you knew where
route thought processes, were recorded on both to find the information you needed and how to
audiotape and videotape. Participants were get it?" and "Did you ever feel "lost" or confused
encouraged to verbalize what came to mind as as you were using Netscape@? When? What did
they worked in the system. Once the verbaliza- you do to try and overcome this feeling?"
tions were recorded, transcriptions were cre- Responses to the questions were used to indicate
ated. Think-aloud protocols provided us with an the participants' perceived levels of knowledge
external artifact of the thought processes in (metacognitive, subject, system), perceived ori-
which participants engaged during their entation, and perceived self-efficacy.
searches (Ericsson & Simon, 1984).

Stimulated Postsearch Interviews


Audit Trails
Following the transcription of protocols and the
Videotapes of the search sessions were used to creation of audit trails, participants were inter-
generate audit trails of individual searches. Such viewed individually to gather additional reflec-
audit trails have been used previously to trace tions and comments related to their search.
hypermedia navigation paths (Gay & Mazur, Videotapes of the participant's search were used
1993; Misanchuk & Schwier, 1991; Shin, et al., during the interview to stimulate recall. The
1994). An audit trail is a visual representation of interviews helped to establish perceived knowl-
the path taken in a computer-based environ- edge and success at individual tasks. As with the
ment. In this study, the locations of "point and postsearch questionnaire, queries during the
click" responses that activated hyperlinks or stimulated postsearch interview emphasized the
buttons were recorded as navigation points. In five attributes examined in the study. For exam-
collaboration with think-aloud protocols, audit ple, when asked to reflect on metacognitive
COGNITIVE STRATEGIESAND LEARNING FROM THE WWW 43

awareness, participants were asked: "Did your initial metacognitive knowledge on the pre-
search strategy change over time? If yes, what study survey, then again on the poststudy ques-
made you change your strategy? If no, what tionnaire.
indicated to you that your strategy was effec-
tive?"
Other interview questions were based on the
Perceived Orientation
initial analysis of each participant's search. Perceived orientation referred to an individual's
Areas targeted for follow-up reflected instances awareness of location within a system and of
when the participant expressed confusion or strategies and activities needed to access desired
exhibited contradictory behavior. Contradictory information. Perceived disorientation was estab-
behavior was defined as an action taken that did lished during the analysis of the think-aloud
not appear related to the information provided protocols (Suchman, 1987) and again during the
by the system or in the participant's think-aloud postsearch questionnaires and interviews.
statement. For example, some participants
viewed information that offered a potential solu-
tion to the problem pursued in their search, yet PerceivedSe~-Efficacy
they did not perceive it as relevant. Perceived self-efficacy referred to judgments of
one's ability to organize and execute needed
DESIGN AND ANALYSES actions using particular knowledge or skill. In
this study, participants rated perceived self-effi-
Embedded case study methods were employed,
cacy, both in terms of using computer technolo-
involving multiple cases as embedded units
gies in general and to search for information
within a larger context. Each participant was
using electronic information systems, on the
analyzed as an individual unit (Yin, 1994). The
presearch survey and postsearch questionnaire.
methods combined descriptive and analytical
approaches. The research was descriptive in that
the goal was to describe evidence gathered, System Knowledge
including the perspectives of the participants
and the researchers. During analysis, informa- System knowledge referred to self-reported
tion was then transformed iteratively through knowledge about electronic information sys-
analytical induction (Bogdan & Biklen, 1992), a tems in general and Netscape@ in particular. Sys-
procedure used to help categorize large tem knowledge was assessed using presearch
amounts of information from diverse sources. surveys, think-aloud protocols, postsearch ques-
Initial definitions and explanations of search tionnaires, and interviews.
strategies and techniques were derived from
previous information-seeking studies in infor- Prior Subject Knowledge
mation processing and interactive strategy
research (see, e.g., McGregor, 1993). In order to Prior subject knowledge referred to self-esti-
identify themes and trends, definition and mates of prior knowledge and experience
explanation codes were used to categorize the related to the subject for which an individual
data collected. Initial codes were refined and search was conducted. Several instruments
expanded as needed during analysis of the were used to gather data on prior subject knowl-
study data. edge: presearch surveys, think aloud protocols,
postsearch questionnaires, and interviews.
Attributes Studied
Research Phases
Metacognitive Knowledge
Research activities, summarized in Figure 1,
Metacognitive knowledge referred to the included three main phases: presearch activities,
participant's self-reported awareness of cogni- activities during the search, and postsearch
tive processes. Each participant rated his or her activities. These components were implemented
44 ETR&D, Vo145, No. 4

Figure 1 [ ] Study activities

~ troductiont o ~

Begin Search
EndSearch ~ Post-Search I
Time: OneHour Questionnaire

I AudioTape

Analysisof I
Developmental I Revisionof Study
Procedures
I
StudyData

in two stages: developmental and formal. All Prior to the search, participants practiced ver-
research activities, including the developmental bal reporting. This activity involved counting
study, training, data collection and analysis, aloud the number of windows in their house or
took place during a three-month period. apartment, a procedure designed to elicit spatial
and mental visualizations by participants (see
Ericsson & Simon, 1984). Following the practice
Developmental Study session, participants searched using Mosaic@, a
browser similar to Netscape@'s interface and
The developmental study was undertaken ini-
function, thinking aloud as they searched. After
tially to test the clarity of the questions and ter-
searching, the participants completed a ques-
minology, the dependability of the think-aloud
tionnaire.
procedures, and the feasibility of the technology
in data gathering. Four students similar to those Several research procedures, instruments,
in the formal study participated. Each com- and techniques were validated, eliminated, or
pleted a survey measuring reported knowledge, revised in the developmental phase of the study.
the system used to complete the search task, and The practice session for the think-aloud protocol
their rnetacognitive awareness. In addition, each proved sufficient to elicit verbalizations. Partici-
rated perceived self-efficacytoward information pants adapted readily to the task, and required
searching, technology in general, and hyperme- few reminders to think-aloud. In addition, the
dia information systems in particular. survey and interview instruments and proce-
COGNITIVE STRATEGIESAND LEARNING FROM THE WWW 45

Figure 1 [ ] (continued)

Formal Study )

~~NeIn'Class X @ - - /acdce V c r b ~
~'~cape/
oductionto XRep°rting /

Think-AloudProtocol

BeginSearch End Search ~ Post-Search


I Questionnaire
"[ VideoTape

I
Initial Data
Analysis Y.s nIraOu°nsi
sI StimulatedPost- I
SearchInterview

No I

SecondaryData I Additional I
Analysis LiteratureReviewI
I
I
no~
Additional
AnalysisData !1
I
I CumulativeData
Analysis

dures were revised to ensure both clarity and post perceptions, while the stimulated postse-
ease of use. Data gatheringtechniqueswere also arch interview generated feedback regarding
validated, including both the simultaneous the meaning of en-route verbalizations.
searching and think-aloudmethods amongmul- Several participants indicated insufficient
tiple participants. Finally,the postsearch ques- preparation in the use of the system.Two adjust-
tionnaire provided corroboratingdata for search ments were made to address this concern: the
verbalizations and enabled analysis of pre-to- first author provided additional detail during
46 ETR&D,Vo145, No. 4

the presentation, and an optional verbal review or her response to the statement: "How can I [the
prior to the actual searching. During the devel- teacher[ research new information for my unit
opmental study, Mosaic@was found to be slow, [course subject[ next week?" The problem task
awkward, and limited in its search support was both directed and exploratory in nature;
tools. Therefore, Netscape@ was adopted for the that is, while participants were directed to
formal study because of its improved speed and devise a solution using Netscape@ to find their
efficiency, and the availability of search engines information, the problem topic selected and
to traverse the Web. Finally, technical problems methods used to solve the problem varied from
in the use of video to capture both user actions individual to individual.
and screen data were identified and resolved After completing the think-aloud practice
prior to the formal study. session, participants began their search. Based
on time results from a developmental study, one
hour was identified as the typical search time for
Formal Study novice WWW users. Therefore, they were allot-
The formal study is also represented in Figure 1. ted one hour to complete their task, but were
As with the developmental study, three phases told they could return later if needed. Prior to
were involved: presearch, during the search, searching, participants answered three ques-
and postsearch. tions:
1. What information do you hope to find during
PresearchActivities. A three-hour introduction, the search?
which included basic information about the
2. Do you have a strategy in mind for how you
WWW, Netscape@, and the tools available to
will find what you are looking for?
support searches, was provided. Several home
pages were introduced, including the Welcome 3. What do you plan to do with the information
home page for Netscape@ and NetSearch, once you find it?
Netscape@'s access page to search engines. Par- This information was used as an indication of
ticipants were encouraged to "play with" the strategies prior to, and after, the search session.
system during the class, were given the prese- All participants began their search at the
arch survey, and told to submit the survey when same home page, Welcome to Netscape@. Net-
they returned for their scheduled search ses- Search provided several search engines for find-
sions one week later. ing information on the WWW and also on
Participants practiced the think-aloud proce- Internet Gopher servers, file transfer protocol
dures employed in the study prior to their for- sites, and Telnet locations. As the participants
mal search session. As in the developmental searched, the first author monitored and
study, they were asked to describe their assisted with hardware problems, avoiding
thoughts as they determined the number of win- guidance in search completion.
dows in their house or apartment. As partici- To facilitate the search, a simple job aid was
pants practiced thinking aloud, the first author provided at each search station to remind vartic-
monitored the sessions and encouraged them to ipants of their role:
speak audibly as they thought.
• Why did you select that?
Search Activities. The search task was initiated • Why are you interested in that topic?
following the WWW and Netscape@ introduc- • What was interesting about that topic?
tion. During this session, the first author
prompted the think-aloud process with state- An overall think-aloud reminder,
ments such as: "Don't forget to talk about what • Don't forget to talk about what you are think-
you are thinking" and "What are you thinking ing,
now?" Reminders were provided when the was also included.
participant's voice became inaudible, she or he
ceased to speak or had difficulty thinking aloud. PostsearchActivities. After searching for one
Each participant's search was guided by his hour, participants were asked to complete the
COGNITIVE STRATEGIESAND LEARNINGFROM THEWWW 47

Figure 2 [ ] Synopsis of analysis process

:::Transot~bad: I
I-~ Cr~nk-AiO~il : I
j :VideO tape, ,~
translated:into II i•:
Transcriptl~
notesi area,solI
interest related I I
J I tOresearch |
L queetionsj

Researcher:

l•re
view of data Io|
umr,arys.aet I identify I
Oeneialed:::J questionsfor |
Post-Search II
Interviews •
i I

II
i

Iii .~o,,.~ I
I ~st-~erc.I
S ~ j..rc.s=,
expa,aded . j
Interviews:::•

.....

~ Rem~he,:/ ~ (" Resea=.,,.}


read through re eat

L I 'co!legion : / L I r=~rch ! ~. acuonCodes


!nstrumen!s , /

I.. Pa~cipant's II I Collatedata


I ~ . vedfyCase , ~ accordlngto
~ Reports : J l " " ' - - I research :
.... : ..... * L questions

/ I ::~R"'~: ~ / I .e.a=~r :1 j Identify trends ~i


: ~ : roa0:~,ated: __ re . . . . / I~:~ code: 1 determ;ne |
tO
I\; l i: data, ~ ~"' " ~ . . . . Ico,at~d~m / cross-case I I
I" i i i identifying. I I-wtthstrategYI ~ . ~ strategies •
L.. ::i: ~tent,e! :.: L / ~.d~on :1
: , discrepancies : : codes

postsearch questionnaire. The questionnaire among the data, methods, and research ques-
was completed and returned before they tions are summarized in Table 2.
departed the lab. Participants also scheduled
stimulated postsearch interviews to be com-
pleted during the following week. Preliminary Organization and Analysis
Most of the data collection, organization, and
Analysis and Procedures analysis occurred iteratively during a four-week
period. This schedule helped to indicate gaps in
As illustrated in Figure 2, data analysis was con- data as they were gathered and organized,
ducted during several phases. The relationships allowing adaptations and indicating the need
48 ETR&D,Vo145,No. 4

Table 2 [ ] Research question, d a t a sources, a n d m e t h o d s

Research Question Data Gathered How Obtained When Who

1. How does meta- Written responses to Presearch Survey Presearch Participant


cognitive knowledge several questions
affect the strategies
employed? Protocol Think-Aloud Protocol Search Participant
Audit Trail Video tape Search Participant
Written responses to Postsearch Questions Postsearch Participant
several questions
Verbal responses to Stimulated PostSearch Postsearch Participant &
several questions Interview Researchers

2. How do perceptions Protocol Think-Aloud Protocol Search Participant


of disorientation
interact with the Audit Trail Video tape Search Participant
strategies employed?
Written responses to Postsearch Questions Postsearch Participant
several questions
Verbal responses to Stimulated Postsearch Postsearch Participant &
several questions Interview Researchers

3. How does perceived Written responses to Presearch Survey Presearch Participant


self-efficacy affect the several questions
strategies employed?
Written responses to Postsearch Questions Postsearch Participant
several questions
Verbal responses to Stimulated Postsearch Postsearch Participant &
several questions Interview Researchers

4. How does system Written responses to Presearch Survey Presearch Participant


knowledge affect several questions
the strategies
employed? Protocol Think-Aloud Protocol Search Participant
Audit Trail Video tape Search Participant
Written responses to Postsearch Questions Postsearch Participant
several questions
Verbal responses to Stimulated Postsearch Postsearch Participant &
several questions Interview Reasearchers

5. How does subject Written responses to Survey Presearch Participant


knowledge affect the several questions
strategies employed?
Protocol Think-Aloud Protocol Search Participant
Audit Trail Video tape Search Participant
Written responses to Postsearch Questions Postsearch Participant
several questions
Verbal responses to Stimulated Postsearch Postsearch Participant &
several questions Interview Researchers

Overall Question: What Written responses to Survey Presearch Participant


strategies are employed several questions
by learners as they work
in a hypermedia infor- Protocol Think-Aloud Protocol Search Participant
mation system?
Audit Trail Video tape Search Participant
Written responses to Postsearch Questions Postsearch Participant
several questions
Verbal responses to Stimulated Postsearch Postsearch Participant &
several questions Interview Researchers
COGNITIVESTRATEGIESANDLEARNINGFROMTHEWWW 49

Figure 3 [ ] Sample search trail

~ ~ Ne~capeI ~ / Entere¢l I

Unable to Rocky Horror


locate host Picture Show Movies

WehCrawler ~ / Display'ex, ~l ( WebCrawler


results J \ box k results

The RM Movie ~ \ GOING


Page J
\ BAC, 1 1 ("• Mov'es

Screenwriters and .ebCrawler "~[ ( Movie


playwriters home
page results • ~. resourc(

Back WcbCrawler ~] k( WebCrawlcrresults

Back movies • I I Media tools

WobC
results
wl0r

(Werawlor
results
(.obCr,wl0r
results

Search
Continues...

for further information (see, e.g., Glaser & involved a step-by-step reconstruction of the
Strauss, 1967; Hert, 1992). Formal analysis, com- participant's movement in the WWW. The infor-
prising several reviews of the data, took place mation gathered from the video tapes was trans-
near the end of the data collection phase formed into a search trail, which included the
(Bogdan & Biklen, 1992). locations visited by participants during the
Think-aloud transcripts of the audio record- search. A sample search trail for a study partici-
ings provided a verbatim record of the search pant is illustrated in Figure 3.
session. Transcription of the video tapes Preliminary analysis took place as transcripts
50 ETR&D,Vo145,No. 4

Table 3 [ ] Sample search script

Action~Location in the WWW Think-Aloud Protocol

Selection of search engine: WebCrawler We'll try another one. Another engine. That was taking forever.
Let's try WebCrawler. Should have more luck with this one--I
hope! I tried this one last nite. It wasn't as bad as this Lycos. Okay.
Enter search term: Let's look under emotional handicapped. Search for that. I wonder
"emotionalhandicapped" if you have to lower this 35. I was looking at that last nite and it
was interesting to me. You could probably narrow down your
results if you didn't want to sit here and wait for the system to
find 35 return documents. Or I am assuming that's what that is.
Anyway, I hope I am talking loud enough here for you to hear
what I am saying.
Presentation of WebCrawler results Okay. High load on the WebCrawler.
Selection from hit list: DealerNet So, okay, so it is sponsored by these people, so let's go into
DealerNet and see. Oh, gosh, yeah. I don't think this is where I
want to be. About DealerNet Rent a Car. This is so funny. Okay.
This is not where I want to be.
Selection of Netscape@option: History Okay. Let's go down here. Okay. I am going to go back and see
where I was before. And that was WebCrawler.
Selection of search engine: WebCrawler Okay. Let's go back to WebCrawler. I used the history to go back
um under go.
Enter search term: "reading" Okay, let's see. Let's try another topic. Urn... sigh.., okay.
Let's try something more generic. Maybe I can get into
emotionallyhandicapped after I get into the reading subject.
Presentation of WebCrawler results Number of... Right where I was before...
Selection from hit list: Outside On-line Okay, let's try Star... I tried DealerNet and it was about cars.
Interactive on-line thing. Okay, I am reading through this. Okay.
Okay. This is a lot of reading... Let's try Star Corporate. All
right. This is where I was before.
Selection from WebPage: Map of A map. Let's try a map and see where we are going. Yeah, that's
Seatac Airport not what I wanted. This is so funny. Okay, we'll go back. Using
the history [back button].

were generated. A participant s u m m a r y sheet In-Depth Analysis


was used to summarize the analysis and to assist
in organizing the data (McGregor, 1993; Miles & Individual Cases. Before b e g i n n i n g in-depth
Huberman, 1984). The summary sheet related each analysis, think-aloud protocols and search trails
research question to the instrument(s) examined, were combined to generate scripts. A sample
aiding in the linking of data to metacognitive script for a study participant is shown in Table 3.
knowledge, perceived self-efficacy, system knowl- A "script" format, often used in screen plays,
edge, and subject knowledge. movies, and television, was used to link the ele-
Stimulated postsearch interviews were ments of what was displayed on the screen a n d
scheduled one week after completion of data the participants' verbalizations. This enabled the
collection; one hour was allotted for each inter- linking of the participants' location in the W W W
view. Initial analysis of the think-aloud proto- with their verbalizations.
cols a n d search trails helped to guide the Examination, categorization, tabulation, and
formulation of additional questions appropriate recombination techniques were used through-
for individual interviews. Videotapes were out the in-depth analysis. As s h o w n in Table 4,
s h o w n d u r i n g the interview to stimulate recall implementation took place d u r i n g several
of particular instances in the search process. stages. Each instrument was examined carefully,
COGNITIVESTRATEGIESANDLEARNINGFROMTHEWWW 51

Table 4 [ ] Stages of in-depth individual case analysis via read-through

Stage Researcher Action Result

Read through all instruments Notes and ideas related to emerging themes
Read through all instruments Identify plot or overarching theme
Review notes Additions to notes related to emerging
themes
Read through all instruments Themes and patterns identified
Read through all instruments, Data highlighted according to research
guided by research questions questions
Read through identified themes Strategies related to themes and patterns
and patterns, comparing to identified
established strategy list
Read through data highlighted Strategies related to research questions
according to each research question, identified
comparing to established strategy list
Read through all instruments Action and decision points identified
Read through identified actions Strategies related to actions and decisions
and decisions, comparing to identified
established strategy list

and themes and patterns were identified during used by participants as they searched. Themes
each reading. During this phase, each partici- and patterns not readily applicable to estab-
pant was analyzed as an individual case; i.e., lished categories were assigned to new catego-
each participant's instruments were "read" as a ries and given new codes. Code examples
complete set. Reading enables the researcher to include: AWARERETR--awareness of retrieval
gain a broad orientation toward the data, as well technique; DECMAKING--making a decision; DIS-
as to gain indications for further analyses ORIENT--disorientation; STRATEXPL--strategy:
(Bogdan & Biklen, 1992; Yin, 1994). During the exploring a n d t r y i n g different things;
first five stages of analysis, the "read through" STRATREFL--strategy:reflection.
included presearch survey, scripts, postsearch Consistent with the iterative and generative
questionnaires, and stimulated postsearch inter- nature of qualitative analysis (Lincoln & Guba,
views. Beginning with the presearch survey, 1985), the analysis process was broadened dur-
each question and answer was read on all instru- ing stage 8. As in stages I through 3, all data ele-
ments and for each participant. During stages 1 ments, actions, and decision points were
through 3, points of interest were noted and identified. These actions and decision points
plots (overarching themes) were generated. were used in stage 9 to code according to strat-
During stages 4 and 5, the focus of the read egy. Data were then collated according to the
through was narrowed, yielding specific themes corresponding research questions. Each coded
for each participant. Data were then highlighted data source was organized by research question
using multi-colored markers keyed to the corre- and reanalyzed to match and clarify patterns.
sponding research questions (see Ericsson & Pattern matching involves detecting similarities
Simon, 1984, for a description of the mark-up in the thoughts and/or actions across partici-
process). pants (Bogdan & Biklen, 1992) to identify initial
The data elements examined in stages 6 and 7 trends in strategies.
involved specific instances (themes and pat- Next, participant verification of the derived
terns) identified in the first five stages. Using the profiles was initiated (see Bogdan & Biklen,
highlighted data, instances were then coded. 1992; Mathison, 1988). Validation of the derived
The codes and their associated definitions profiles included themes, patterns, and strate-
related to the actions, decisions, and strategies gies. To facilitate feedback, individual case
52 ETR&D, Vo145, No. 4

Table 5 [ ] A Sample of Marsha's Case Report

The Traveler: Biographical and Background Information

This section of the case report contained general information on the participant, including age, ethnicity,
educational pursuits, and reported knowledge in the five areas examined in the study.

Destination: The Search Task


In this section, the participant's problem was discussed, including: the subject area searched and the strategy
the participant planned to use while searching for the information.
Marsha started the journey with a well-defined goal and strategy in mind. Her initial goal: "I hope to find information
about dinosaurs. But not real, real technical or historic information because the children that I am teaching are 3, 4, and
5 year olds . . . . "Marsha's strategy: "Just kind of search everything and everywhere."

The Journey: Exploring the Web


General Explanation of the Trip:
This section provided an overview of the participant's search: what they did, the sites they visited on the
WWW, and the changes that occurred as the participant searched for their information.
She never really returned to her original search task, but, instead, completely changed herfocus from "real dinosaurs to
Barney@, a fictitious dinosaur. I want to find information catered to children, so I figured since Barney@ was a kid
thing, that he should lead me to what I was looking for . . . . "
General Themes and Patterns:
This section contained specific information on the participant's search, including themes and patterns
established by each participant as they search for information on the WWW.
Despite the apparent "wishy-washy," lack offocus and control to Marsha's search, there was an underlying theme
throughout: her classroom. Marsha does indeed go on several tangents, and there is a lot of action, but she is connecting
it through prior knowledge and experience to her classroom. . . .

Overall Themes and Patterns


This section outlined overall themes and patterns emerging from each participant's search.
Low se~C-confidence in using technology, Confusion over what she wanted to do

reports were generated. A standard structure, used: aggregation by episode and aggregation
depicted in Table 5, ensured consistency in the by process (Ericsson & Simon, 1984). In aggre-
information provided to, and the organization of gating the data, individual cases were merged
comments from, each participant who was into a single instance. As illustrated in Figure 4,
asked to review the report and to generate ques- aggregation focused on similar episodes within
tions or concerns for discussion with the searches and similar processes used across par-
researchers. ticipants. For example, while Mick engaged in
One week later, the first author met individu- several unique strategies (organizing, planning,
ally with participants to discuss the case reports. evaluating, etc.), he also used strategies similar
Results indicated a high degree of researcher- to those used by other participants, including
participant agreement. Recommendations from reliance on prior knowledge, reflection, and
each participant were noted during the inter- visualization. The identification of cross-case
views; where indicated, changes a n d / o r addi- strategies was essential to determining the gen-
tions were made. erality of strategies used.

Cross-Case Comparison. Analysis of global pat- Cross-Case Data Accumulation. T h e final phase
terns and trends was necessary to address the of the analysis process involved cumulative
overall research question. Two methods were data analysis, where cross-case trends, issues,
COGNITIVE STRATEGIESAND LEARNING FROM THE ~ 53

Figure 4 [ ] Aggregation of individual cases

StratExpl IdentNeed Analysis

AwareThink

Marsha Bill

StratPrior | I PriorKnow StratChnge

StratRefl

Mick Alyssa

StratOrg ]k ~, StratPlan

Diffund | [ Evaluation

DocMaking J ~, Narrow ]l [, StratLocat

and themes were examined as complete units FINDINGS AND DISCUSSION


(Lincoln & Guba, 1985). During this phase,
trends and themes from the cross-cases analysis Given the nature of qualitative analysis, as well
as the amount of data presented, findings and
were categorized according to the research ques-
interpretations are discussed together. The dis-
tions. From these data, interpretations of the
cussion focuses on the four participants for
strategies used by participants were generated whom detailed analyses were conducted, and is
by the researchers based on analysis of all data not intended to be generalized beyond the scope
elements. of this study.
~4 ETR&D, Vo145, No, 4

Table 6 [ ] Summary of participants reported knowledge and overall rating of "success"

Participant Metacognitive Disorientation Self-Efficacy System Subject "Success"Rating


Alyssa mid high low low mid no
Bill high mid mid low mid yes
Marsha low mid mid low low no
Mick high low high low high yes

Distinctions Among Participants technologies in general. She reported little abil-


ity and confidence in the use of information-
Participant ratings are summarized in Table 6.
retrieval technologies, and that she was very
The ratings reflect self-reported perceptions on
uncomfortable using systems like Netscape®. In
the various measures and overall success. To
addition, Alyssa reported low confidence in her
protect the identity of the participants, pseudo-
ability to select key terms for an information
nyms are used. The descriptors provided for
search, and expressed doubt in her ability to
participants indicate an overall theme for their
complete the search task.
search. Themes were generated during the
Alyssa's choice for her search task was:
analysis process.
"What are the components of a good reading
lesson for emotionally handicapped students?"
Alyssa: The Mapless Traveler She reported feeling somewhat knowledgeable
in this topic, as she planned to teach in this area
Alyssa was an undergraduate special education
after completing her degree. Alyssa rated herself
major in her early 20s. She was employed full-
as possessing midlevel prior subject knowledge.
time and was in the final year of undergraduate
Alyssa's goal was to: " . . . retrieve at least
studies. Alyssa reported being a novice in the
three articles that dealt with reading or the
use of hypertext and hypermedia applications.
teaching of readin~ to students with emotional
She had used other information-retrieval tech-
handicaps." Her strategy: "... go into Netsearch.
nologies, such as ERIC and electronic card cata-
Select an engine, type in my keywords and click
logs, but had employed only basic search
search. That's it!"
techniques. She had performed all types of
searches (subject, author, title, keyword), but
had not used Boolean operators (e.g., and, or, Bill: The Divergent Directed Traveler
not), and stated she " . . . didn't know they
existed." Alyssa rated herself low in system Bill, a substitute teacher in his late 40s, was
knowledge. enrolled in a special, K-5 certification program
Alyssa indicated metacognitive awareness. designed to recruit individuals to the teaching
During the presearch survey, where participants profession. In addition to substitute teaching,
described how they would "make a pizza," she Bill owned a landscaping company and pro-
reported, "I had to think about what I had fessed a personal interest in gardening.
already put on the pizza and what I still had left Bill rated himself as a relative novice in the
to assemble." Alyssa rated herself as possessing use of hypertext and hypermedia applications.
midlevel metacognitive knowledge. He had used other information-retrieval tech-
Alyssa rated her perceived self-efficacy as nologies such as ERIC, and reported having pre-
low. She reported feeling confused by computer viously performed subject and keyword
technologies and uncomfortable in her ability to searches. Bill rated his prior system knowledge
use them. One exception was word processing, as low based on his limited use of Netscape@, but
with which Alyssa reported feeling very confi- had previous experience with related systems.
dent. Alyssa also reported awareness of profes- During the search task, Bill referenced previous
sional benefits for knowing and using computer search experiences to inform his actions in
COGNITIVE STRATEGIESAND LEARNING FROM THE WWW 55

Netscape®. He appeared to acquire system retrieval technologies extensively, including


knowledge quickly, using this knowledge to ERIC and electronic card catalogs. However,
guide his search. Marsha reported she had not progressed beyond
In the questions following the pizza-making basic search techniques. She had performed var-
description exercise on the presearch survey, Bill ious types of searches (subject, author, title, key-
reported: "Yes [I was monitoring what I was word), but had not used Boolean operators " . . .
doing], so [I] would not put on more ingredients because I didn't know how to." Marsha rated
than needed so [the] company could make a herself low in system knowledge.
profit." Bill rated himself high in metacognitive Marsha reported a lack of metacognitive
knowledge, and rated his perceived self-efficacy awareness, and rated herself low in metacogni-
toward technology as midrange. He reported tive knowledge. During the pizza-making exer-
feeling somewhat confused by, and anxious cise, Marsha reported not monitoring what she
over, computer technologies, and as feeling was thinking. Marsha's perceived self-efficacy
somewhat uncomfortable in his ability to work toward technology was in the mid-to-low range.
with them. Like other students in the class, how- In general, she reported feeling very confused
ever, Bill had prior experience with word pro- and anxious toward computer technologies and
cessors, with which he reported feeling very somewhat uncomfortable in her ability to work
confident. Bill also reported awareness of pro- with them (except for word processing). Marsha
fessional benefits in knowing about and using also reported awareness of professional benefits
computer technologies. in knowing and using computer technologies in
Bill reported high ability and confidence in general. When rating her ability and confidence
information-retrieval technologies. He indicated in information-retrieval technologies, Marsha
feeling comfortable using systems like reported feeling somewhat uncomfortable using
Netscape® and in selecting terms for an informa- Netscape®. On the other hand, she reported con-
•tion search. Bill also expressed confidence in his fidence in her ability to use information-retrieval
ability to start and successfully complete his technologies, including selecting search terms,
search. Bill's search task was to, " . . . look for getting started, and successfully completing a
basic information for children (in grades 3-5) to search task.
learn about plant life."
Marsha's search focused on: "How and what
Bill's goal was to " . . . provide facts children to teach very young children (3- to 4-year-olds)
can use for their own search in school to aug- about dinosaurs." She reported wanting to pro-
ment existing books in the library about plants, vide factual information to balance the informa-
plant growth." When asked about his strategy tion about a fictional purple dinosaur: "I hope to
for searching, Bill responded: " . . . [I will] select teach them some factual information about
Netsearch [from the button row to choose a dinosaurs so that they can associate that those
search engine], select WebCrawler, enter name [dinosaurs] were real animals, not just
of topic 'photosynthesis' and/or plant growth, BarneyR." Marsha reported feeling " . . . a bit
plant life . . . . " He identified where to begin his
green" in the topic area, rating herself low in
search and several keywords to be used.
subject knowledge. Her initial goal was " . . . to
find information about dinosaurs. But not real,
real technical or historic information because the
Marsha: The Explorer
children that I am teaching are 3-, 4-, and 5-year-
Marsha, in her early 20s, was completing her olds and they are mentally delayed. So they are
first year in a master's degree program in early real, real young, but they have a natural fascina-
childhood education. In addition to attending tion with dinosaurs and, of course, because of
classes, Marsha was a full-time teacher of a pre- Barney®." Marsha's search strategy included,
K, ESL (English as a Second Language) class in a "Just kind of search everything and everywhere.
rural elementary school. Marsha rated herself as I am not really familiar with a lot of things so
a novice in the use of hypertext and hypermedia any search units associated with education and
applications. She had used other information- children I will probably open up and see."
56 ETR&D, Vo145, No. 4

Mick: The Focused Traveler Results By Research Question

Mick was a communications major in his early


Overall Research Question: What strategies
40s completing coursework toward a PhD. In
are employed in open-ended hypermedia
addition, Mick was a teaching assistant and
irrformation systems ?
script consultant. He had prior experience using
hypertext and hypermedia applications, specif- Three overall trends emerged:
icaUy HyperCard®. Mick reported extensive 1. A variety of strategies were used by learners
experience using other information-retrieval as they sought information in a hypermedia
technologies, including the ERIC and PsychLit information system;
databases and electronic card catalogs. Mick
2. Metacognition, system, and subject knowl-
reported applying advanced search techniques
edge affected strategy choice and utilization;
with these applications, not only performing
and
varied types of searches (subject, author, title,
keyword), but using Boolean operators exten- 3. Perceptions of disorientation, as well as per-
sively to "... narrow the focus of my search." ceived self-efficacy, affected strategy choice
Mick's lack of experience with Netscape® and utilization.
resulted in a low self-rating in system knowl- Discussion of overall trends is provided in the
edge. However, his prior experience with tech- context of the five secondary questions.
nology, though not directly related to Netscape®
and WWW technologies, aided his search. He
Question One: Does metacognitive
appeared to quickly acquire specific system
knowledge affect the strategies employed?
knowledge of Netscape®. Mick also indicated
awareness of metacognitive knowledge. During Of the knowledge areas examined, metacogni-
the pizza-making exercise, he monitored what tire knowledge appeared to most influence
he was thinking, visualizing the procedure as he strategy use. Participants with high metacogni-
wrote it out. Mick rated himself high in tive knowledge appeared better able to reflect on
metacognitive knowledge. their search processes, which enabled them to
Mick's self-reported confidence with technol- refine their actions and make better use of the
ogy was very high. He reported no confusion or system. Participants who used the system effec-
anxiety toward computer technologies, and tively were active information processors and
indicated comfort in his ability to work with comprehenders who monitored their learning
them. Mick's reports were mixed (medium, activities, processes deemed critical for develop-
high) in his ability and confidence in using infor- ing understanding (West, Farmer, & Wolff,
mation-retrieval technologies. Although he 1991).
reported being very comfortable using systems Participants with high metacognitive knowl-
like Netscape®, he also indicated he was some- edge also appeared better oriented to the sys-
what uncomfortable selecting search terms. In tem. Mick, for example, consistently monitored
addition, Mick reported being only somewhat his thinking and revised his actions accordingly.
confident in his ability to start and to success- He engaged in several key metacognitive tasks
fully complete his search. He reported a high described by Wang, Haertel, and Walberg (1990)
level of subject-area expertise and rated himself as important for learning and understanding:
high in prior subject knowledge. comprehension monitoring, use of self-regula-
Mick attempted to locate script-writing mate- tion and self-control strategies, and use of these
rial for his communications class: "I a m . . . look- strategies to facilitate generalization. Mick's
ing for material that I can utilize in my media metacognitive skills were fundamental to his
class. I want to see if there is any screenplay Success.

material on line." Mick's strategy: " . . . use the Mick provided several examples of meta-
search drivers that were pointed out and dis- cognitive knowledge usage. One example
cussed in our class--had keywords thought out occurred at the beginning of his search task,
(e.g., screen play)." when Mick questioned his terminology:
COGNITIVE STRATEGIESAND LEARNING FROM THE WWW 57

I have to think of my keywords here. I think if ! say activity d u r i n g their searches, the effects varied.
script, that might be a little too broad and I might end According to Flavell (1979), a metacognitive
up getting different scripting, like toward software
experience is any conscious cognitive experience
programs. And maybe not just television writing . . . .
that accompanies and pertains to an intellectual
enterprise. His description is consistent with this
Another statement reinforced Mick's use of
study: "To illustrate, y o u m a y experience a
metacognitive strategies:
m o m e n t a r y sense of p u z z l e m e n t that y o u subse-
quently ignore, or you m a y w o n d e r for some
I am probably spending too much time in this particu- time if you really u n d e r s t a n d w h a t another per-
lar driver. I should probably try another one. Let's try
television. U m . . . Well, maybe I am wrong. Maybe... son is u p to" (p. 908). Both the sense of puzzle-
I am just using an inappropriate key . . . . ment and w o n d e r about u n d e r s t a n d i n g were
experienced b y each participant.
Bill also demonstrated metacognifive aware- Interestingly, the m a n n e r in which
ness throughout his search. He relied on metacognitive experiences are processed
metacognitive knowledge while attempting a impacts whether, a n d how, metacognition influ-
n e w strategy: ences action. As FlaveU (1979) writes:

Well, I don't know what this is. See what happens. Some metacognitive experiences are best described as
Plants. See what happens when I select plants. Land items of metacognitive knowledge that have entered
plants. None of this info is giving me the depth that I consciousness. As one example, while wrestling with
wanted for elementary school students. This is way too some stubborn problem, you suddenly recall another
advanced. So I will have to go to another source . . . . problem very like it that you solved thus and so. Some
metacognitive experiences clearly cannot be described
that way, however. For instance, the feeling that you
Bill also relied on metacognitive knowledge are still far from your goal is not in itself a segment of
when he was confused: metacognitive knowledge, although what you make of
that feeling and what you do about it would undoubt-
edly be informed and guided by your metacognitive
S o . . . oops. Pressed the wrong button. What is going
knowledge... (p. 908).
on here? Now Thursday, when this happened, all I had
to do is come here and go down to there, it brought me
down to where I was. Now I will use the bookmark. This interplay between metacognitive knowl-
Now I don't need this. And I really don't need this . . . .
edge and prior subject k n o w l e d g e differentiated
Mick from other participants. His extensive
In contrast, Alyssa demonstrated little use of prior subject knowledge both augmented, and
metacognitive knowledge. Although she was influenced by, his metacognitive knowl-
reported midlevel cognitive awareness on the edge. The interplay between factors (e.g.
presearch survey, it was not evident in her metacognitive k n o w l e d g e a n d p r i o r subject
search. Her search session was m a r k e d b y knowledge) was common. As illustrated in Fig-
apparently r a n d o m actions: ure 5, participants engaged m a n y strategies d u r -
ing their searches. For example, Alyssa's
Guess I didn't make my topic specific enough. I am not d e p l o y m e n t of metacognitive k n o w l e d g e w a s
sure why it gave me this thing.., when I first tried this apparently impaired b y other factors, including
yesterday, it wouldn't bring up my subject. So this is
disorientation, frustration, a n d impatience. This
the first time I actually got results. And I am just look-
ing at all this stuff and it doesn't make sense as to why finding is consistent with Derry's (1989) obser-
they are giving it to me . . . . I wanted to teach a reading vation that successful learners assess situational
lesson, but it has to be really specific to students with requirements and develop p l a n s to deal w i t h
emotional handicaps because I am not teaching regu- them. Alyssa's inability to d e p l o y metacognitive
lar students. That's what I was trying to look for. So I
started with emotionally handicapped to see if I could strategies o r to develop plans m a d e completion
work my way down, or cross reference it somehow... of her task especially problematic.
And I am not sure what this is helping me do . . . . The importance of metacognitive k n o w l e d g e
has been w e l l - d o c u m e n t e d (see, e.g., Brown &
While all participants reported metacognitive Palincsar, 1989; Paris, Cross, & Lipson, 1984).
58 ETR&D, Vo145, No. 4

Yet, m e t h o d s for assisting learners in refining not getting anywhere! It's not doing anything. Okay.
their metacognitive knowledge are not readily Let's just return back to the HomePage. Oh, let's try
Yahoo. I have not tried Yahoo. Let's try education. I do
apparent. Some have advocated the teaching of
not know how I got here, but I got here . . . .
specific metacognitive skills (Osman &
Hannafin, 1992); others have trained students to
This study p r o v i d e d further evidence of
effectively monitor their learning (Brown & Pal-
incsar, 1989; Paris, et al., 1984). Still, recommen- being "lost in hyperspace" (Berk & Devlin,
dations for teaching or training are often 1991). On repeated occasions, Alyssa indicated
equivocal and difficult to substantiate empiri- she felt confused and n e e d e d a map. Bill also
cally. While results of this study support the reported some disorientation, occasionally voic-
i m p o r t a n c e of metacognitive knowledge, fur- ing uncertainty:
ther investigation is needed to facilitate the util-
ity of metacognitive k n o w l e d g e and skill in Go to the next source by going back. I forgot what I
even selected. I forget how I got to SAPS. I forget how
open-learning environments.
I got here. SAPS as an experiment is something I could
use. Janette--copy of response to seedlings to light. Be
able to see what happens when they remove the sun-
Question Two: Is perceived orientation light from seedlings. Just don't remember how I got to
influenced by the strategies employed? SAPS. . . .
User orientation a p p e a r e d to influence the strat-
egies observed and reported. At times, each par- Bill also indicated a lack of awareness of h o w
ticipant reported feeling "lost" or "being in the he influenced the system's output:
m i d d l e of nowhere" while searching on the
Web. Disorientation, in turn, affected individual [I am] not really sure of what is happening here, but it
search decisions. High levels of disorientation doesn't look like it is giving me anything.
caused significant dissatisfaction with the search
process. For some, this not only increased frus- Marsha also expressed some disorientation,
tration, b u t also became debilitating. b u t it was not debilitating:
Several researchers have discussed the conse-
quences of disorientation on usability (see, e.g., Let's see the kids' Web. That would be good. This bet-
Jonassen & Grabinger, 1990; Marchionini, 1988). ter be good. It should have stuff that kids created. Oh,
let's see.., where am I. Some thing where the kids cre-
Significant disorientation m a y hinder the user's
ated everything. Come on host, connect me. I would
ability to reference relevant prior subject knowl- think it would be the same host. It is all on the same
edge as well as metacognitive knowledge. Dis- page. Ooo. They couldn't locate the host. That wasn't
orientation also tends to lower the user's nice . . . .
perceived ability to succeed, resulting in lower
confidence a n d task persistence (Beasley & H e r confusion often related more to the
Waugh, 1995; Tripp & Roby, 1990). absence of a response than to the information
Alyssa's high levels of disorientation and dis- retrieved:
satisfaction provide compelling evidence of
these effects. Her failure to retrieve relevant Oh, dinosaurs. Why does it do that? If I click on it, I
information, p a i r e d with her use of primitive would think it would show up. I clicked on the wrong
search strategies, suggest that disorientation one. Oh, well, no, I did it. !t is 307K so it will takeforever
seriously h a m p e r e d her search. Phrases such as: for the picture to come up! I don't understand why I
just couldn't get Barney® on mine. What was the lady
"I a m getting nowhere" and "I am going every-
out in Texas thinking? Okay. Almost done. It's just a
w h e r e b u t w h e r e I need to be," were typical of picture . . . .
her think-aloud comments. Even when Alyssa
perceived progress, disorientation was evident:
Like Bill, Marsha's perceived orientation
enabled her to continue her search task.
Let's just try libraries. Information, business and law,
science and engineering. Let's try information on Mick, on the other hand, d i s p l a y e d very little
library studies. Hours. Yeah. This is not working. I am disorientation. Throughout his search, disorien-
COGNITIVE STRATEGIESAND LEARNING FROM THE WWW 59

tation surfaced only twice in the protocol: once a user-friendly format and it is not accurate.
w h e n something was not found and he received First Author: This is really interesting to me. 'Cause you
an error message, and a second time w h e n he found one . . . .
became confused as to h o w he arrived at a cer- Mick: Yeah!
tain point:
First Author: For the Star Wars stuff. But you never
What does this do? Some sort of FTP... Okay. What is went back and tried to find another one for this movie
the deal with this? Shooting script. Army of Darkness. series, for some reason. Any particular reason why?
Now see, that didn't have a specific heading and it is
Mick: Uh, let me see what the script looks like. U h . . . I
definitely a script. I have no idea of how on earth I got
think that might be part of it [the reason he didn't
here. I need to go peek at how that was listed. I don't
return].
remember it saying it was a script. And it is still load-
ing. Okay is it done? Yes. Okay. This is a full blown First Author: Okay.
shooting script for the Army of Darkness. Off-shoot of
the Evil dead . . . .
Mick: Well, I'll tell you the other part of it. There was a
script that I found, but it was not properly formatted.
Mick's reaction to disorientation differenti- So I didn't want to waste my time looking at those, I
ated h i m from other participants. Rather than wanted one that was properly formatted. I wanted a
real script . . . .
being deterred, he continued with his task, rely-
ing on his extensive knowledge in other areas to Although Marsha was unsuccessful in her
guide a n d refine his approach. search, her high confidence and perceived self-
efficacy helped her to identify other useful infor-
mation. She found several related resources that
Question Three: Does perceived self-efficacy she subsequently intended to use in her class.
affect the strategies employed? Bill utilized other abilities to guide his search,
such as persistence and d o m a i n knowledge.
Perceived self-efficacy affected both the n u m b e r
While he indicated some lack of control and
and types of strategies engaged. Those who per-
understanding, it did not seriously hamper his
ceived m e d i u m (Bill and Marsha) to high (Mick)
effort.
self-efficacy engaged in more strategies and at
Alyssa, in contrast, consistently d e m o n -
higher levels than the low self-efficacy partial-
strated low perceived self-efficacy which, in
p a n t (Alyssa). Alyssa's lack of confidence
turn, influenced her interactions and strategies.
resulted in low-level searches to simply locate
She often voiced uncertainty as to how to pro-
information. This finding is consistent with
ceed, and was unable to evolve her u n d e r s t a n d -
studies on the relationship between self-efficacy
ing of the system. She perceived herself as
and performance, where high self-efficacy par-
"trapped b y the system." This lack of confidence
ticipants engaged in more exploration of the sys-
in her abilities was reflected in her repeated
tem (Ashton, 1984; Kinzie & Delcourt, 1991;
statements of self-doubt and requests for guid-
Murphy, 1988). Increased exploration appeared
ance:
to create more opportunities, increasing the
participants' prospects of locating the desired ... Guess I didn't make my topic specific enough. I am
not sure why it gave me this thing. It's not done!... I
information.
am just looking at all this stuff and it doesn't make
Perceived self-efficacy affected not only the sense as to why they are giving it to me .... It has noth-
nature of the interactions, but also perceptions of ing to do with what I w a n t . . . I am not sure what this
control. Both Bill and Mick reported high per- is helping me do . . . .
ceived self-efficacy and were successful in their
task. Throughout the search, Mick tried several
Question Four: Does prior system knowledge
different approaches and expressed a high
affect the strategies employed?
degree of confidence. When asked about a deci-
sion regarding scripts he was examining, Mick The level of system knowledge had a stronger
offered the following response: apparent influence on strategy use than prior
subject knowledge. This outcome is consistent
Mick: Well, most of the stuff that I found so far is legit-
imately formatted. But there are a couple of scripts that with Park and H a n n a f i n ' s (1993) c o n d u s i o n as
apparently users up-loaded--they put the format into to the importance of establishing a functional
60 ETR&D. Vo145, No. 4

mental m o d e l of open multimedia systems. Par- Nope. No it isn't. Try again. Photosynthesis. Okay. The
ticipants with low system knowledge engaged mouse doesn't work. Have to use the return button.
Okay. Lesson learned. Found 58 documents. 35
in m o r e primitive search strategies than those
returned. Trying to decipher the information here . . . .
with high system k n o w l e d g e - - e v e n though There is plant nutrition. Possibly something. Life of a
some possessed significant prior domain knowl- tree. That's one that kinda sounds photosynthesis. I
edge. While increased system knowledge alone did not want that one. I did not want that one. I will
m a y not ensure success, it is critical to selecting stop that one. Can I back up? Yes. Good. Oops. Did it
terms and knowing how to interact, as well as to again. Back up. Go back. There you go.,You put the fin-
ger on it and that works much better than the palm...
reducing disorientation and frustration. Partici-
pants w h o quickly developed system knowl-
edge were better able to quickly develop During the interview, participants were
strategies for finding their information. asked to describe the mental image they had (if
any) of the WWW. Bill and Mick were able to
Inadequate system knowledge inherently
describe and depict their mental models of the
limited system use. Marsha's statement typified
system, but neither Marsha nor Alyssa could do
the dilemma:
so. Mayer's (1989) work on conceptual models
There is probably some faster way to do it [going provides an interesting interpretative frame-
back[, but I know you can do it this way [using the
work. He found that in studies where concep-
back key].
tual models were provided, learners with low
The use of the back key in Netscape® required prior k n o w l e d g e were able to make significant
more time to navigate through the system than strides in problem solving a n d understanding.
otherwise necessary, increasing frustration and The availability of the m o d e l enabled them to
disorientation levels. Alyssa's comments reflected proceed in w a y s not previously possible. Learn-
similar uncertainty: ers with high prior knowledge, in contrast, often
Okay. What does this have to do with my topic? This is constructed their own mental models. For these
too long. I have no patience for t h i s . . . This is taking learners, external models often led to conflict
forever. I guess I could have used the back and forth and lowered performance. While participants in
k e y . . . This is taking so long . . . . Let's try the forward the present study were not p r o v i d e d a model
key and see if that work. And the forward key is not
working. Okay, let's just keep going... prior to the search task, those who generated
their o w n engaged in more advanced (and suc-
A l t h o u g h Mick had not previously used cessful) strategies.
Netscape®, he h a d worked with other hypertext
and h y p e r m e d i a systems. He a p p e a r e d to pos-
sess a general orientation to their operation. For Question Five: Does prior subject knowledge
example, Mick was able to query the system and affect the strategies employed?
react accordingly:
While the participants used a variety of strate-
I am probably spending too much time in this particu- gies independent of their prior subject knowl-
lar driver. I should probably try another one. Let's try edge, those with limited subject knowledge
television. U m . . . Well, maybe I am wrong. Maybe...
I am just using an inappropriate key . . . . engaged in more primitive search strategies,
relying heavily on a few key terms. These find-
Unlike Alyssa, whose low system knowledge ings s u p p o r t the conclusions of several research-
and high frustration became debilitating, Mick ers: learners with extensive prior knowledge
controlled the environment. H e generated his outperform their cohorts w i t h limited prior
o w n questions related to his activities and inter- knowledge (Langer & Nicolich, 1981; Recht &
p r e t e d system output accordingly. Leslie, 1988). Prior subject k n o w l e d g e assists the
Bill's interactions provide good examples of learner in generating terms that m a y be relevant
h o w system knowledge evolves through usage. to their specific search topic. In this study, the
Initially, he was unaware of how to use the ability to generate and recognize related terms
pointer to click on objects he wanted to retrieve; influenced w h a t was p u r s u e d in the system and,
yet, he quickly resolved the problem: in turn, h o w the system was used.
Enter in photosynthesis. Guess that is spelled right. Prior subject knowledge also appeared to
COGNITIVESTRATEGIESAND LEARNINGFROMTHEWWW 61

affect the ability to integrate and retain new transform information could lead learners to
information. Bill, who possessed significant sub- perceive failure in a search task, when, in fact,
ject knowledge, refined his search using previ- the information they seek is available.
ously attempted terms. Marsha, who possessed
little prior subject knowledge, refined her search
little, using few new or alternative terms. High
IMPLICATIONS A N D
subject knowledge enables learners to utilize a RECOMMENDATIONS
variety of terms as they search for information.
They not only possess knowledge of common
Several implications and recommendations can
terms associated with the field, but may also
be drawn from this study. Disorientation played
possess a wealth of related terms and concepts.
a significant role in system use, a problem cited
Bill, Mick, and Alyssa made use of several as a significant issue in the use of OELEs
terms, while Marsha used a limited set. While (Hannafin et al., 1994). In the present study, per-
the number of terms used during the search pro- ceived disorientation inhibited OELE use, lead-
cess was not a strong indicator of success or fail- ing to reported discomfort and confusion.
ure, it could indicate difficulty in monitoring Disorientation tended to inhibit effective and
and judging the relevance of system output in successful use of the system.
relation to information sought, as well as limited
The contrast between Mick's successful
knowledge of how to manipulate the system to
search and Alyssa's unsuccessful search session
refine the search. Hansen (1986) reported a sim-
may reflect the extensive cognitive requirements
ilar result with naive searchers looking for infor-
of open-ended learning. Mick, who possessed
mation from both print and electronic sources.
metacognitive strategies, as well as the knowl-
The ability to utilize "hit lists" (i.e., the results
edge base (system and subject) and a high
presented by the information system to the
degree of self-efficacy, reported very little disori-
learner) to refine a search, adapting terminology
entation and was able to fully engage in the
and the search task (i.e., changing search terms,
browsing and searching process. While Alyssa
search engines, etc.), are crucial to the successful
possessed some subject knowledge, her low skill
retrieval of information.
in the other areas, along with her high degree of
According to Ausubel (1963), the ability to disorientation, limited the effectiveness of her
integrate and transform information is crucial to browsing and searching. Although research is
performance. The integration and transforma- needed to confirm this finding, it may be critical
tion of information involves the learner's ability to reduce perceived (or real) system discomfort
to relate new information to prior knowledge. and disorientation prior to advancing open
Even if participants located the information learning applications. Helping learners to con-
sought, their ability to evaluate its veracity and struct a functional mental model of the system,
judge its relevance was limited. Failure to inte- and providing searching tips, should increase
grate and transform the information accessed their chances of success in finding desired infor-
during a search often caused conflicts with both mation.
performance and search success. Two cognitive operations, integrating and
Mick provided examples of this phenomenon angling, appear to be integral to the success of
throughout his search. On several occasions the OELEs (Duchastel, 1990). Duchastel's definition
information he sought was displayed in the hit list; of integration involves the assimilation and
however he was not able to identify it as the infor- accommodation of new information into existing
mation he sought. During the stimulated postse- schemata. Angling is the ability to view informa-
arch interview, he expressed disbelief that he tion from different perspectives. For example,
overlooked the information and failed to recognize angling enables the learner to determine the
it, review it critically, relate it to existing knowl- potential usefulness of Web Sites that are not
edge, and examine it from multiple or competing directly related to the key terms used. Awareness
perspectives. While Mick was ultimately success- of these skills and the ability to manipulate them
ful in his search, the inability to integrate and appears to be crucial for monitoring activities
62. ETR&D,Vo145, No, 4

and improving orientation in OELEs. If so, it divergent thinking and multiple perspective
m a y become critical to promote the develop- building, as well as critical thinking and prob-
ment and use of metacognitive strategies. lem solving, are needed to assist learners in
Learner control is another area requiring adapting these environments.
investigation. Previous studies have indicated As open-ended hypermedia information sys-
that the success of user control varies according tems grow, both in their capabilities and
to learner characteristics such as aptitude and affordances, the need to better support learners
prior knowledge (Cho, 1995; Ross & Rakow, becomes increasingly critical. The promise of
1981; Shin, et al., 1994). Extensive learner control hypermedia and OELEs l~as been widely her-
m a y inhibit success in some electronic learning alded, but the potential has yet to be realized.
environments, since learners often do not select Balance is needed between the efforts to refine
wisely when given open-ended choices the structure and features of OELEs, and efforts
(Romiszowski, 1990). Based on the present to empower individuals in their use. []
study, learner choice appears to significantly
influence the success of OELEs: learners who Janette R. Hill is with the Department of Educational
developed good system knowledge successfully Technology at the University of Northern Colorado.
completed their searches, while those with low Her e-mail address is: hill@edtech.univnorthco.edu.
system knowledge were unable to develop sys- Michael J. Harmafin is with the Learning and
tem knowledge, expressed disorientation, and Performance Support Laboratory at the University of
Georgia. His e-mail address is:
were unsuccessful. While research is needed to hannafin@coe.uga.edu.
confirm these preliminary interpretations, This manuscript is based on the doctoral
teaching strategies for finding information in dissertation conducted by the first author at The
open information systems like the WWW may Florida State University. The authors wish to
acknowledge Dr. Marcy P. Driscoll and Dr. Robert A.
assist learners in their tasks.
Reiser of the Instructional Systems Program, Florida
A final implication relates to how individuals State University, Dr. Elisabeth L. Logan of the School
think and process information in traditional ver- of Library and Information Studies, Florida State
University, and Dr. Kent L. Gustafson of the
sus open learning environments. Conventional
Instructional Technology Program, University of
school activities may encourage "compliant" Georgia for their cooperation and support as
thinking (McCaslin & Good, 1992); traditional committee members during the conduct of this
education has been largely externally managed study. The preliminary manuscript was prepared
and teacher-directed. This creates a fundamental while the first author was working as a postdoctoral
fellow at The University of Georgia's Learning and
problem for OELEs that emphasize exploration Performance Support Laboratory.
and learner-centered thinking. OELEs afford
opportunities to access (and encourage this
access) to a vast array of resources in a variety of
REFERENCES
formats. Traditional methods may engender
generations of learners who are ill-equipped for
Ashton, P. (1984). Teacher efficacy: A motivational
OELEs, where individual control, divergent paradigm for effective teacher education. Journal of
thinking, multiple perspectives, and indepen- Teacher Education, 35(5) 28-32.
dent thinking are crucial (Driscoll, Lebow, Hill, Ausubel, D. P. (1963). Cognitive structure and the facil-
& Rowley, 1994). The epistemic beliefs, or gen- itation of meaningful verbal learning. Journal of
Teacher Education, 14, 217-221.
eral assumptions, students hold about the
Bandura, A. (1977). Self-efficacy: Toward a unifying
.nature of learning may prove to be the root issue theory of behavioral change. Psychological Review,
in the utility of complex, open-ended learning 84(2), 191-215.
(Feltovich, Spiro, Coulson, 1989; Schoenfeld, Batson, T, & Bass, R. (1996). Primacy of process: Teach-
1983; Schrommer, 1993, 1994). Previous research ing and learning in the computer age. Change, 28(2),
in hypertext environments suggests that effec- 42-47.
Beasley, R. E., & Waugh, M. L. (1995). Cognitive map-
tiveness differs among learners with different ping architectures and hypermedia disorientation:
epistemic beliefs (Jacobson, 1990; Jacobson, et An empirical study. Journal of Educational Multimedia
al., 1995; Jacobson & Spiro, 1995) Efforts to foster and Hypermedia, 4(2/3), 239-255.
COGNITIVE STRATEGIESAND LEARNING FROM THE WWW 63

Berk, E., & Devlin, J. (Eds.) (1991). Hypertext/hypermedia Heft, C. A. (1992). Exploring a new model for under-
handbook. New York: McGraw-Hill. standing information retrieval interactions. In D.
Bogdan, R. C., & Biklen, S. K. (1992). Qualitative Shaw (Ed.), Proceedings of the 55th ASIS Annual Meet-
research for education (2nd ed.). Boston, MA: Allyn ing (pp. 72-75). Pittsburgh, PA.
and Bacon. Hildreth, C. R. (1987). Beyond Boolean: Designing the
Brown, A. L., & Palincsar, A. S. (1989). Guided, cooper- next generation of on-line catalogs. Library Trends,
ative learning and individual knowledge acquisi- 35(4), 647-667.
tion, In L. B. Resnick (Ed.), Knowing, learning, and Hill T., Smith, N. D., & Mann, M. F. (1987). Role of effi-
instruction: Essays in honor of Robert Glaser (pp. 393- cacy expectations in predicting the decision to use
451). Hillsdale, NJ: Lawrence Erlbaum Associates, advanced technologies: The case of computers. Jour-
Inc. nal of Applied Psychology, 72(2), 307-313.
Cho, Y. (1995). Learner control, cognitive processes and Jacobson, M. J. (1990). Knowledge acquisition, cognitive
hypertext learning environments. Paper presented at flexibility, and the instructional applications of hypertext:
the annual meeting of NECC. (ERIC Document ED A comparison of contrasting designs for computer-
392 439). enhanced learning environments. Unpublished doc-
Dede, C. (1996, March). Emerging technologies in dis- toral dissertation, University of Illinois at
tance education for business. Journal of Education for Urbana-Champaign.
Business, 71, 197-200. Jacobson, M. J., Maouri, C., Mishra, P., & Kolar, C.
Derry, S. (1989). Putting learning strategies to work. (1995). Learning with hypertext learning environ-
Educational Leadership, 46(4), 410. ments: Theory, design, and research. Journal of Edu-
Driscoll, M. P., Lebow, D., Hill, J. R., & Rowley, K. cational Multimedia and Hypermedia, 4(4), 321-364.
(1994, April). The effect of generative teaching on Jacobson, M. J., & Spiro, R. J. (1995). hypertext learning
students" metaphors for learning. Paper presented at environments, cognitive flexibility, and the transfer
the annual meeting of the NCIC (American Educa- of complex knowledge: An empirical investigation.
tional Research Association), New Orleans, LA. Journal of Educational Computing Research, •2(5), 301-
Duchastel, P. C. (1990). Discussion: Formal and infor- 333.
mal learning with hypermedia. In D. H. Jonassen, & Jonassen, D. H., & Grabinger, R. S. (1990). Problems
H. Mandl (Eds.). Designing hypermedia for learning and issues in designing hypertext/hypermedia for
(pp. 135-143). New York: Springer-Verlag. learning. In D. H. Jonassen and H. Mandl (Eds.),
Ericsson, K. A., & Simon, H. A. (1984). Protocolanalysis: Designing hypermedia for learning. New York:
Verbal reports as data. Cambridge, MA: MIT Press. Springer-Verlag.
Feltovich, P. J., Spiro, R. J., & Coulson, R. L. (1989). The Jorde-Bloom, P. (1988). Self-efficacy expectations as a
nature of conceptual understanding in biomedicine: predictor of computer use: A look at early childhood
The deep structure of complex ideas and the devel- administrators. Computer in the Schools, 5(1/2), 45-
opment of misconceptions. In D. Evans, & V. Patel 63.
(Eds.), The cognitive sciences in medicine (pp. 113-171). Kinzie, M. B., & Delcourt, M. A. B. (1991). Computer
Cambridge, MA: MIT Press. technologies in teacher education: The measurement of
Flavell, J. H. (1979). Metacognition and cognitive mon- attitudes and self-efficacy. (ERIC Document Reproduc-
itoring: A new area of cognitive development tion Service No. ED 331 891)
inquiry. American Psychologist, 34, 906-911. Kinzie, M. B., Delcourt, M. A. B., & Powers, S. M.
Gay, G., & Mazur, J. (1993). The utility of computer (1994). Computer technologies: Attitudes and self-
tracking tools for user-centered design. Educational efficacy across undergraduate disciplines. Research
Technology, 33(4), 45-59. in Higher Education, 35(6), 745-768.
Gilbert, S. (1996). Making the most of a slow revolu- Kozma, R. B. (1988). The implications of cognitive psy-
tion. Change, 28(2), 10-23. chology for computer-based learning tools. Educa-
Glaser, B. G., & Strauss, A. L. (1967). The discovery of tional Technology, 27(11), 20-25.
grounded theory: Strategiesfor qualitative research. Chi- Kuhlthau, C. C. (1991). Inside the search process: Infor-
cago: Aldine. mation seeking from the user's perspective. Journal
Hannafin, M. J., Hall, C., Land, S., & Hill, J. (1994). of the American Society for Information Science, 42(5),
Learning in open-ended environments: Assump- 361-371.
tions, methods, and implications. Educational Tech- Land, S., & Hannafin, M. J. (1996). A conceptual frame-
nology, 34(8), 48-55. work for the development of theories-in-action with
Hannafin, M. J., Hill, J. R., & Land, S. (1997). Student- open-ended learning environments. Educational
centered learning and interactive multimedia: Sta- Technology Research & Development, 44(3), 37-53.
tus, issues, and implications. Contemporary Langer, J. A., & Nicolich, M. (1981). Prior knowledge
Education, 68(2), 94-99. and its relationship to comprehension. Journal of
Hansen, K. A. (1986). The effect of presearch experi- Reading Behavior, •3(4), 373-379.
ence on the success of naive (end-user) searches. Lincoln, Y. S., & Guba, E. G. (1985). Naturalistic inquiry.
Journal of the American Societyfor Information Science, Beverly Hills, CA: Sage.
37(5), 315-318. Marchionini, G. (1988, November). Hypermedia and
64 ETR&D. Vo145, No, 4

learning: Freedom and chaos. Educational Technol- Romiszowski, A. J. (1990). Hypertext/hypermedia


ogy, 8-12. solution--but what exactly is the problem?. In D. H.
Marchionini, G. (1995). Information seeking in electronic Jonassen, & H. Mandl (Eds.). Designing hypermedia
environments. New York: Cambridge University for learning (pp. 321-354). New York: Springer-Ver-
Press. lag.
Mathison, S. (1988). Why triangulate? Educational Ross. S.M., & Rakow, E.A. (1981). Learner control ver-
Researcher, 17(2), 13-17. sus program control as adap*tive strategies for selec-
Mayer, R. E. (1989). Models for understanding. Review tion of instructioal support on math rules. Journal of
of Educational Research,59(1), 43-64. Educational Psychology, 73(5), 745-753.
Mayes, T., Kibby, M., & Anderson, T. (1990). Learning Schoenfeld, A. H. (1983). Beyond the purely cognitive:
about learning from hypertext.. In D. H. Jonassen, & Belief systems, social cognitions, and
H. Mandl (Eds.). Designing hypermediafor learning metacognitions as driving forces in intellectual per-
(pp. 227-250). New York: Springer-Verlag. formance. Cognitive Science, 7, 329-363.
McCaslin, M., & Good, T. (1992). Compliant cognition: Schrommer, M. (1993). Epistemological development and
The misalliance of management and instructional academic performance among secondary students.
goals in current school reform. Educational Journal of Educational Psychology, 85(3), 406-411.
Researcher,21(3), 4-17. Schrommer, M. (1994). An emerging conceptualization
McGregor, J. H. (1993). Cognitive processes and the of epistemological beliefs and their role in learning.
use of information: A qualitative study of higher In R. Garner, & P. A. Alexander (Eds.), Beliefs about
order thinking skills used in the research process by text and instruction with text (pp. 2540). Hillsdale,
students in a gifted program (Doctoral dissertation, NJ: Lawrence Erlbaum.
Florida State University, 1993). DissertationAbstracts Shin, E. C., Schallert, D. L., Savenye, W. C. (1994).
International, 54(7), A2367. Effects of learner control, advisement, and prior
Miles, M. B., & Huberman, A. M. (1984). Drawing valid knowledge on young student's learning in a
meaning from qualitative data: Toward a shared hypertext environment. Educational Technology
craft. Educational Researcher,•3(5), 20-31. Research & Development, 42(1), 33-46.
Misanchuk, E. R., & Schwier, R. (1991). Interactive Spindler, M. (1995, September). Shaping a community
media audit trails: Approaches and issues. In Pro- of learners. T.H.E. Journal, 23, 6.
ceedingsof SelectedResearchPresentationsat the Annual Suchman, L. (1987). Plans and situated actions: The prob-
Conventions of the Associationfor Educational Commu- lem of human-machine communication. New York:
nications and Technology. (ERIC Document ED 334 Cambridge University Press.
996). Tripp, S. D., & Roby, W. (1990). Orientation and disori-
Murphy, C. A. (1988). Assessment of computer se~-effi- entation in a hypertext lexicon. Journal of Computer-
cacy: Instrument development and validation. (ERIC BasedInstruction, 17(4), 120--124.
Document Reproduction Service No. ED 307 317). Walster, D. (1996). Technologies for information access
Oliver, T. A., & Shapiro, F. (1993). Self-efficacy and in library and information centers. In D. H. Jonassen
computers. Journal of Computer-Based Instruction, (Ed.), Handbookof researchfor educational communica-
20(3), 81--85. tions and technology (pp. 720-752). New York: Simon
O'Neil, J. (1995). On technology & schools: A conversa- & Schuster Macmillan.
tion with Chris Dede. Educational Leadership, 53(2), Wang, M. C., Haertel, G. D., & Walberg, H. J. (1990).
6-12. What influences learning? A content analysis of
Osman, M. E., & Hannafin, M. J. (1992). Metacognitive review literature. Journal of Educational Research,
research and theory: Critical analysis and 84(1), 30-43.
implications for instructional design. Educational Well, M.M., Rosen, R., & Wugalter, R. (1990). The etio-
Technology Researchand Development,40(2), 83-99. logy of computer phobia. Computers in Human
Paris, S. G., Cross, D. R., & Lipson, M. Y. (1984). Behavior, 6(4), 361-379.
Informed strategies for learning: A program to West, C. K., Farmer, J. A., Wolff, P. M. (1991). Instruc-
improve children's reading awareness and compre- tional design: Implicationsfrom cognitivescience. Engle-
hension. Journal of Educational Psychology, 76, 1239- wood Cliffs, NJ: Prentice Hall.
1252. Whitt, E. J. (1991). "Hit the ground running": Experi-
Park, I., & Hannafin, M. J. (1993). Empirically based ences of new faculty in a school of education. The
guidelines for the design of interactive multimedia. Review of Higher Education, 14(2), 177-197.
Educational TechnologyResearch& Development,41(3), Williams, B. (1995) The Internetfor teachers. Foster City,
63-85. CA: IDG Books.
Perkins, D. N., Simmons, R. & Tishman, S. (1990). Yang, Y. (1993). The effects of self-regulatory skills and
Teaching cognitive and metacognitive strategies. type of instructional control on learning from com-
Journal of Structural Learning, 10(4), 285-292. puter-assisted interactive video. International Journal
Recht, D. R., & Leslie, L. (1988). Effect of prior knowl- of Instructional Media, 20, 235
edge on good and poor readers' memory of text. Yin, R. K. (1994). Casestudy research:Design and methods
Journal of Educational Psychology, 80(1), 16-20. (2nd ed.). Thousand Oaks: Sage.

You might also like